Search Results - "code-based cryptosystem"
-
1
Authors:
Source: Engineering and Applied Science Research, Vol 47, Iss 2, Pp 153-160 (2020)
Subject Terms: asymmetric cryptography, code-based cryptosystem, mceliece cryptosystem, gaussian integer, Technology, Technology (General), T1-995
File Description: electronic resource
-
2
Authors:
Source: Cryptography, Vol 5, Iss 11, p 11 (2021)
Subject Terms: public-key cryptography, code-based cryptosystem, McEliece cryptosystem, Gaussian integers, decoding attack, information-set decoding, Technology
Relation: https://www.mdpi.com/2410-387X/5/1/11; https://doaj.org/toc/2410-387X; https://doaj.org/article/53340758c7854554bb80810ce5e4788e
-
3
Authors:
Source: IEEE Access, Vol 5, Pp 25527-25541 (2017)
Subject Terms: code-based cryptosystem, public key cryptosystem, 13. Climate action, 0202 electrical engineering, electronic engineering, information engineering, MDPC codes, lattice-based cryptosystem, Electrical engineering. Electronics. Nuclear engineering, 02 engineering and technology, QC-LDPC lattices, 7. Clean energy, TK1-9971
-
4
Authors: et al.
Source: Applied Sciences, Vol 10, Iss 5, p 1831 (2020)
Subject Terms: mceliece, hymes, side-channel analysis, code-based cryptosystem, joint distribution, single trace analysis, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999
Relation: https://www.mdpi.com/2076-3417/10/5/1831; https://doaj.org/toc/2076-3417; https://doaj.org/article/af10dcca6f93447bab03158f196b1d84
-
5
Source: Радіотехніка; № 200 (2020): Радіотехніка; 25-36
Радиотехника; № 200 (2020): Радиотехника; 25-36
Radiotekhnika; № 200 (2020): Radiotekhnika; 25-36Subject Terms: постквантовая криптография, кодовая криптосистема, криптосистема Мак-Элиса, обобщенный код Рида-Соломона, криптосистема LPN-C, система линейных уравнений с искаженными правыми частями, post-quantum cryptography, code-based cryptosystem, McEliece cryptosystem, generalized Reed-Solomon code, LPN-C cryptosystem, system of noised linear equations, постквантова криптографія, кодова криптосистема, криптосистема Мак-Еліса, узагальнений код Ріда-Соломона, система лінійних рівнянь зі спотвореними правими частинами
File Description: application/pdf
Access URL: http://rt.nure.ua/article/view/210056
-
6
Authors:
Source: IEEE Latin America Transactions. 13:2003-2008
Subject Terms: LDPC, code-based cryptography, quantum computers, optimisation, Post-quantum cryptography, Decoding, Coding-theory, low density parity check codes, quantum computing, Hardware, Algorithm design and analysis, Goppa codes, McEliece cryptosystem, 2. Zero hunger, code-based cryptosystem, Efficient decoding, RSA codes, public key cryptography, DSA codes, Cryptography, McEliece variant, MDPC codes, quantum cryptography, parity check codes, QC-MDPC McEliece
Access URL: https://enigma.unb.br/index.php/enigma/article/download/20/13
https://enigma.unb.br/index.php/enigma/article/download/20/13
https://digitalcommons.tacoma.uw.edu/tech_pub/40/
https://ieeexplore.ieee.org/document/7164228/
https://works.bepress.com/anderson-nascimento/17/
https://enigma.unb.br/index.php/enigma/article/view/20/13 -
7
Source: Радіотехніка; № 195 (2018): Радіотехніка; 224-234
Радиотехника; № 195 (2018): Радиотехника; 224-234
Radiotekhnika; № 195 (2018): Radiotekhnika; 224-234Subject Terms: криптосистема на основе кода, нечеткий экстрактор, биометрическая криптография, криптографические ключи, криптосистема на основі коду, нечіткий екстрактор, біометрична криптографія, криптографічні ключі, code based cryptosystem, fuzzy extractor, biometric cryptography, cryptographic keys
File Description: application/pdf
Access URL: http://rt.nure.ua/article/view/175206
-
8
Authors: et al.
Contributors: et al.
Subject Terms:
"Fully homomorphic encryption (FHE)," "homomorphic computation," "post-quantum cryptography (PQC)," "error-correcting codes (ECCs)," "Reed-Muller (RM) codes," "digital signature scheme," "code-based cryptosystem.", 621.3 File Description: ix, 80
Relation: 000000178587; https://hdl.handle.net/10371/196433; https://dcollection.snu.ac.kr/common/orgView/000000178587; 000000000050▲000000000058▲000000178587▲
-
9
Authors: et al.
Contributors: et al.
File Description: ELETTRONICO
Relation: info:eu-repo/semantics/altIdentifier/wos/WOS:000471673200013; volume:13; issue:4; firstpage:404; lastpage:410; numberofpages:7; journal:IET INFORMATION SECURITY; https://hdl.handle.net/11566/263712
-
10
Authors: et al.
Contributors: et al.
Subject Terms: Code-based cryptosystem, learning from parity with noise problem, LPN, minimum distance problem, random linear code, public-key cryptosystem
Relation: https://infoscience.epfl.ch/record/187368/files/helen-full.pdf; Proceedings of the 6th International Conference on Cryptology in Africa; Lecture Notes in Computer Science; 7918; AFRICACRYPT 2013, 6th International Conference on Cryptology in Africa; https://infoscience.epfl.ch/handle/20.500.14299/93139
-
11
Authors:
Subject Terms: Code-based cryptosystem, learning from parity with noise problem, minimum distance problem, random linear code, public-key cryptosystem
Relation: https://infoscience.epfl.ch/record/181613/files/helen.pdf; YACC 2012; https://infoscience.epfl.ch/handle/20.500.14299/85892
-
12
Authors:
Contributors:
Source: https://eprint.iacr.org/2013/682.pdf.
Subject Terms: Code based cryptosystem, Polar
File Description: application/pdf
-
13
Authors:
Contributors:
Subject Terms: Code-based cryptosystem, learning from parity with noise problem, minimum distance problem, random
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.348.5118; http://infoscience.epfl.ch/record/181613/files/helen.pdf
-
14
Authors:
Contributors:
Subject Terms: Code-based cryptosystem, learning from parity with noise problem, minimum distance problem
File Description: application/pdf
-
15
Authors: Abdallah, Asmaa
Subject Terms: Privacy, Security, Smart Grid, Smart meter, Smart appliances, BlueJay ultra-lightweight hybrid cryptosystem, Lattice-based homomorphic cryptosystem, lattice-based NTRU scheme, Electric vehicles (EVs), False data injection (FDI) attack, Cosine similarity-based state estimator, Home area networks (HANs), McEliece code-based cryptosystem, Measurement units, Vehicle-to-Grid (V2G) connections
Relation: http://hdl.handle.net/10012/10636
Availability: http://hdl.handle.net/10012/10636
Nájsť tento článok vo Web of Science
Full Text Finder