Search Results - random linear code encryption*
-
1
Authors: Yongge Wang
Source: 2016 IEEE International Symposium on Information Theory (ISIT). :2519-2523
-
2
-
3
Authors:
Source: 网络与信息安全学报, Vol 6, Iss 5, Pp 110-118 (2020)
Subject Terms: polar code, random linear code encryption, message padding, adaptively chosen ciphertext attacks, structural attacks, Electronic computers. Computer science, QA75.5-76.95
File Description: electronic resource
-
4
Authors:
Source: Вісник Національного технічного університету "ХПÌ": Системний аналіз, управління та інформаційні технології, Iss 1 (13), Pp 112-116 (2025)
Subject Terms: cascade transmission model, vpn encryption, hamming codes, forward error correction, data integrity, communication security, parity bit, noise resilience, network attacks, information reliability, Technology
File Description: electronic resource
-
5
Authors:
Source: 网络与信息安全学报, Vol 6, Pp 110-118 (2020)
-
6
Authors: et al.
Source: IEEE Transactions on Information Theory. May2018, Vol. 64 Issue 5, p3927-3943. 17p.
Subject Terms: *DATA encryption, *CYCLIC codes, *PUBLIC key cryptography, *DECODERS & decoding, *PROBABILITY theory
-
7
Authors:
Source: Physical Communication. Mar2014, Vol. 10, p24-30. 7p.
-
8
Authors:
Source: IET Communications (Wiley-Blackwell). Jun2017, Vol. 11 Issue 9, p1195-1198. 4p.
Subject Terms: *LINEAR codes, *TELECOMMUNICATION security, *CRYPTOSYSTEMS, *CRYPTOGRAPHY
-
9
Authors: et al.
Source: Scientific Reports, Vol 15, Iss 1, Pp 1-27 (2025)
Subject Terms: S-Box, Non-linearity, Chaotic map, Random numbers, Wireless communication security, Smart cities, Medicine, Science
File Description: electronic resource
Relation: https://doaj.org/toc/2045-2322
-
10
Authors:
Source: Cryptologia; Jul2024, Vol. 48 Issue 4, p323-351, 29p
Subject Terms: CRYPTOGRAPHY, CRYPTOSYSTEMS, LINEAR codes, PUBLIC key cryptography, DECODING algorithms
-
11
Authors:
Source: ETRI Journal. 2010, Vol. 32 Issue 1, p93-101. 9p. 2 Diagrams, 1 Chart, 3 Graphs.
-
12
Authors: REGEV, ODED
Source: Journal of the ACM; Sep2009, Vol. 56 Issue 6, p34-34:40, 40p, 1 Diagram, 4 Graphs
Subject Terms: LATTICE theory, ERRORS, CRYPTOGRAPHY, PUBLIC key cryptography, ALGORITHMS, MATHEMATICAL models
-
13
Authors:
Source: Finite Fields & Their Applications. Jan2021, Vol. 69, pN.PAG-N.PAG. 1p.
Subject Terms: *LINEAR codes, *PARAMETERIZATION
-
14
Authors:
Source: IET Communications (Wiley-Blackwell). Jul2018, Vol. 12 Issue 11, p1491-1497. 7p.
Subject Terms: *ADVANCED Encryption Standard, *TELECOMMUNICATION security, *TIME complexity, *CHANNEL coding, RELIABILITY of telecommunication
Company/Entity: NATIONAL Institute of Standards & Technology (U.S.)
-
15
Authors: et al.
Source: Scientific reports [Sci Rep] 2025 Jul 28; Vol. 15 (1), pp. 27426. Date of Electronic Publication: 2025 Jul 28.
Publication Type: Journal Article
Journal Info: Publisher: Nature Publishing Group Country of Publication: England NLM ID: 101563288 Publication Model: Electronic Cited Medium: Internet ISSN: 2045-2322 (Electronic) Linking ISSN: 20452322 NLM ISO Abbreviation: Sci Rep Subsets: PubMed not MEDLINE; MEDLINE
-
16
Authors: et al.
Source: Scientific reports [Sci Rep] 2025 May 14; Vol. 15 (1), pp. 16729. Date of Electronic Publication: 2025 May 14.
Publication Type: Journal Article
Journal Info: Publisher: Nature Publishing Group Country of Publication: England NLM ID: 101563288 Publication Model: Electronic Cited Medium: Internet ISSN: 2045-2322 (Electronic) Linking ISSN: 20452322 NLM ISO Abbreviation: Sci Rep Subsets: PubMed not MEDLINE; MEDLINE
-
17
Authors:
Source: Journal of Mathematical Cryptology, Vol 18, Iss 1, Pp 2350051-715 (2024)
Subject Terms: pseudo-random objects, finite field, linear algebra, mixing rate, entropy, total variation distance, 94a60, 37a25, Mathematics, QA1-939
File Description: electronic resource
Relation: https://doaj.org/toc/1862-2984
-
18
Authors: et al.
Contributors: et al.
Source: IEEE Transactions on Information Theory. 70:5323-5342
Subject Terms: FOS: Computer and information sciences, Quantum Physics, Computer Science - Cryptography and Security, FOS: Physical sciences, 0102 computer and information sciences, 02 engineering and technology, [INFO] Computer Science [cs], 01 natural sciences, 0202 electrical engineering, electronic engineering, information engineering, [INFO]Computer Science [cs], Quantum Physics (quant-ph), Cryptography and Security (cs.CR)
File Description: application/pdf
-
19
Linear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applications
Authors:
Source: Proceedings of the 5th conference on Innovations in theoretical computer science-ITCS 14
Subject Terms: 0102 computer and information sciences, 16. Peace & justice, 01 natural sciences
-
20
Nájsť tento článok vo Web of Science
Full Text Finder