Search Results - Code Based Cryptography
-
1
Authors: et al.
Contributors: et al.
Source: 2025 Design, Automation & Test in Europe Conference (DATE). :1-7
Subject Terms: [INFO.INFO-AR] Computer Science [cs]/Hardware Architecture [cs.AR], Instruction sets, Europe, NIST, Hardware, Cryptography, Field programmable gate arrays, Standards, Optimization, RISC-V, CV-X-IF, HQC, FPGA, PQC, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
File Description: application/pdf
-
2
Authors: et al.
Source: IEEE Internet of Things Journal. 12:36318-36327
-
3
Authors:
Source: Discover Computing, Vol 28, Iss 1, Pp 1-31 (2025)
Subject Terms: Post-quantum cryptography (PQC), Code-Based Cryptography, Hybrid Cryptographic Framework, SSL/TLS Protocols, Quantum-Resistant Communication, Quantum Random Number Generators (QRNGs), Electronic computers. Computer science, QA75.5-76.95
File Description: electronic resource
Relation: https://doaj.org/toc/2948-2992
-
4
Authors:
Source: Journal of Discrete Mathematical Sciences and Cryptography. 28:959-972
-
5
Authors: et al.
Contributors: et al.
Source: Series of licentiate and doctoral theses. (186)
Subject Terms: Natural Sciences, Computer and Information Sciences, Computer Sciences, Naturvetenskap, Data- och informationsvetenskap (Datateknik), Datavetenskap (Datalogi)
File Description: electronic
-
6
Authors:
Source: Procedia Computer Science. 259:1034-1048
-
7
Authors: et al.
Source: Jurnal Teknik Indonesia. 3:49-53
-
8
Authors: et al.
Source: Jurnal Teknik Indonesia. 3:61-67
-
9
Authors: Gassner, Niklas
Source: Gassner, Niklas. Codes over Rings, Their Generic Decoding and Their Use in Code-Based Cryptography. 2025, University of Zurich, Faculty of Science.
-
10
Authors:
Subject Terms: FOS: Computer and information sciences, Cryptography and Security, Information Theory (cs.IT), Information Theory, Cryptography and Security (cs.CR)
Access URL: http://arxiv.org/abs/2507.01118
-
11
-
12
Authors:
Source: IEEE Open Journal of the Communications Society, Vol 3, Pp 1528-1539 (2022)
Subject Terms: generalized concatenated codes, Telecommunication, 0202 electrical engineering, electronic engineering, information engineering, restricted error values, TK5101-6720, 02 engineering and technology, Transportation and communications, Code-based cryptography, public-key cryptography, McEliece cryptosystem, HE1-9990
File Description: application/pdf
-
13
Authors:
Index Terms: info:eu-repo/semantics/other
URL:
https://ir.cwi.nl/pub/35231
info:eu-repo/grantAgreement/NWO/024.003.037/3368 -
14
Source: Lecture Notes in Computer Science ISBN: 9783031902284
-
15
Authors:
Source: 2024 International Conference on Science Technology Engineering and Management (ICSTEM). :1-5
-
16
Authors:
Source: 2024 25th International Symposium on Quality Electronic Design (ISQED). :1-8
-
17
Authors:
Source: Advances in Information Security, Privacy, and Ethics ISBN: 9798369392201
-
18
Authors: et al.
Contributors: et al.
Source: IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) Decryption Failure Attacks on Post-Quantum Cryptography. 2019(1):238-258
Subject Terms: Engineering and Technology, Electrical Engineering, Electronic Engineering, Information Engineering, Computer Systems, Teknik, Elektroteknik och elektronik, Datorsystem
Access URL: https://doi.org/10.13154/tches.v2019.i1.238-258
-
19
Authors:
Source: Procedia Computer Science. 2025, Vol. 259, p1034-1048. 15p.
-
20
Authors:
Source: Prikladnaya Diskretnaya Matematika. :84-109
Nájsť tento článok vo Web of Science
Full Text Finder