Search Results - "Code based cryptosystem"

Refine Results
  1. 1

    Two modifications for Loidreau’s code-based cryptosystem by Guo, Wenshuo, Fu, Fang-Wei

    ISSN: 0938-1279, 1432-0622
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.09.2024
    “…This paper presents two modifications for Loidreau’s cryptosystem, a rank metric-based cryptosystem constructed by using Gabidulin codes in the McEliece…”
    Get full text
    Journal Article
  2. 2

    Breaking and Improving a Lattice-Code-Based Cryptosystem by Li, Ling, Xing, and Yeo by Athukorala, Pabasara, Galbraith, Steven D.

    ISSN: 0018-9448, 1557-9654
    Published: IEEE 01.09.2025
    Published in IEEE transactions on information theory (01.09.2025)
    “…Li, Ling, Xing, and Yeo (LLXY) have proposed a code-based encryption scheme based on factoring in finite fields. The security of the scheme relies on both the…”
    Get full text
    Journal Article
  3. 3

    A Secure Code Based Cryptosystem via Random Insertions, Deletions, and Errors by Esmaeili, Mostafa, Gulliver, T. Aaron

    ISSN: 1089-7798, 1558-2558
    Published: New York IEEE 01.05.2016
    Published in IEEE communications letters (01.05.2016)
    “…In this letter, a new code based cryptosystem with a public code is introduced. This cryptosystem is based on randomly flipping, deleting, and inserting bits into a codeword corresponding to a plaintext…”
    Get full text
    Journal Article
  4. 4

    polarRLCE: A New Code-Based Cryptosystem Using Polar Codes by Lin, Zhiqiang, Yi, Zongxiang, Wang, Yongge, Liu, Jingang

    ISSN: 1939-0114, 1939-0122
    Published: Cairo, Egypt Hindawi Publishing Corporation 26.12.2019
    Published in Security and communication networks (26.12.2019)
    “…Security challenges brought about by the upcoming 5G era should be taken seriously. Code-based cryptography leverages difficult problems in coding theory and…”
    Get full text
    Journal Article
  5. 5

    About One Method of Constructing a Code-Based Cryptosystem Based on Quasi-Cyclic Codes by Isaeva, M. N., Ovchinnikov, A. A.

    ISSN: 2769-3538
    Published: IEEE 30.05.2022
    “…This article discusses the problem of constructing a public-key code-based cryptosystem based on quasi-cyclic codes and the hard task of complete decoding…”
    Get full text
    Conference Proceeding
  6. 6

    Polar code-based cryptosystem: comparative study and analysis of efficiency by Redhu, Ritu, Narwal, Ekta

    ISSN: 2502-4752, 2502-4760
    Published: 01.11.2023
    “… The paper identifies several areas for further research and development, such as improved security and reliability of polar code-based cryptosystems…”
    Get full text
    Journal Article
  7. 7

    ADMM and Reproducing Sum-Product Decoding Algorithm Applied to QC-MDPC Code-Based McEliece Cryptosystems by Watanabe, Kohtaro, Ohtsuka, Motonari, Tsukie, Yuta

    ISSN: 0018-9448, 1557-9654
    Published: New York IEEE 01.03.2024
    Published in IEEE transactions on information theory (01.03.2024)
    “…QC-MDPC (quasi cyclic moderate density parity check) code-based McEliece cryptosystems are considered to be one of the candidates for post-quantum…”
    Get full text
    Journal Article
  8. 8

    A smart surveillance system utilizing modified federated machine learning: Gossip‐verifiable and quantum‐safe approach by Dharani, Dharmaraj, Anitha Kumari, Kumarasamy

    ISSN: 1532-0626, 1532-0634
    Published: Hoboken, USA John Wiley & Sons, Inc 01.11.2024
    Published in Concurrency and computation (01.11.2024)
    “…Summary Edge computing has the capability to process data closer to its point of origin, leading to the development of critical autonomous infrastructures with…”
    Get full text
    Journal Article
  9. 9

    New Code-Based Cryptosystem Based on Binary Image of Generalized Reed-Solomon Code by Ivanov, Fedor, Krouk, Eugenii, Zyablov, Victor

    ISSN: 2694-5215
    Published: IEEE 25.10.2021
    “…McEliece cryptosystem represents a smart open key system based on the hardness of the decoding of an arbitrary linear code, which is believed to be able to…”
    Get full text
    Conference Proceeding
  10. 10

    Ciphertext-Only Attack on Linear Feedback Shift Register-Based Esmaeili-Gulliver Cryptosystem by Lee, Yongwoo, Kim, Young-Sik, No, Jong-Seon

    ISSN: 1089-7798
    Published: IEEE 01.05.2017
    Published in IEEE communications letters (01.05.2017)
    “…Esmaeili and Gulliver recently proposed a secret key cryptosystem based on error-correcting codes in which a codeword modified by random insertions, deletions,…”
    Get full text
    Journal Article
  11. 11

    A New Class of Q-Ary Codes for the McEliece Cryptosystem by Freudenberger, Jürgen, Thiers, Johann-Philipp

    ISSN: 2410-387X, 2410-387X
    Published: MDPI AG 01.03.2021
    Published in Cryptography (01.03.2021)
    “…The McEliece cryptosystem is a promising candidate for post-quantum public-key encryption. In this work, we propose q-ary codes over Gaussian integers for the…”
    Get full text
    Journal Article
  12. 12

    Two modifications for Loidreau's code-based cryptosystem by Guo, Wenshuo, Fu, Fangwei

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 06.04.2021
    Published in arXiv.org (06.04.2021)
    “…This paper presents two modifications for Loidreau's code-based cryptosystem. Loidreau's cryptosystem is a rank metric code-based cryptosystem constructed by using Gabidulin codes in the McEliece setting…”
    Get full text
    Paper
  13. 13

    Code-based security with random interleaving by Esmaeili, Mostafa, Gulliver, Thomas Aaron

    ISSN: 1751-8628, 1751-8636
    Published: The Institution of Engineering and Technology 01.06.2017
    Published in IET communications (01.06.2017)
    “… Unlike most code-based cryptosystems, the code is known publicly. The encryption is based on randomly interleaving two codewords containing random errors…”
    Get full text
    Journal Article
  14. 14

    Efficient prevention technique for false data injection attack in smart grid by Abdallah, Asmaa, Xuemin Shen

    ISSN: 1938-1883
    Published: IEEE 01.05.2016
    “…False data injection (FDI) attack is one of the severe attacks that threatens the smart grid's efficiency and reliability. Power grid's status is monitored by…”
    Get full text
    Conference Proceeding Journal Article
  15. 15

    Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages by Park, ByeongGyu, Kim, Suhri, Hong, Seokhie, Kim, HeeSeok, Seo, Seog Chung

    ISSN: 2076-3417, 2076-3417
    Published: Basel MDPI AG 06.03.2020
    Published in Applied Sciences (06.03.2020)
    “…Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum…”
    Get full text
    Journal Article
  16. 16

    New Code-Based Cryptosystem with Arbitrary Error Vectors by Ivanov, Fedor, Krouk, Eugenii

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 31.05.2020
    Published in arXiv.org (31.05.2020)
    “…McEliece cryptosystem represents a smart open key system based on the hardness of the decoding of an arbitrary linear code, which is believed to be able to…”
    Get full text
    Paper
  17. 17

    An Efficient Public Key Encryption Scheme Based on QC-MDPC Lattices by Bagheri, Khadijeh, Sadeghi, Mohammad-Reza, Eghlidos, Taraneh

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 01.01.2017
    Published in IEEE access (01.01.2017)
    “…In this paper, we introduce a new family of lattices, namely QC-MDPC lattices, which are a special case of LDPC lattices, and an improved bit flipping…”
    Get full text
    Journal Article
  18. 18

    Geo Security using GPT Cryptosystem by Khan, Eraj, Khalid, Abbas, Ali, Arshad, Atif, Muhammad, Salman, Ahmad

    ISSN: 2158-107X, 2156-5570
    Published: West Yorkshire Science and Information (SAI) Organization Limited 2020
    “… In any code based cryptosystem, public and private keys are in the form of matrices based over the finite field…”
    Get full text
    Journal Article
  19. 19

    Joint channel coding-cryptography based on random insertions and deletions in quasi-cyclic-low-density parity check codes by Esmaeili, Mostafa, Gulliver, T. Aaron

    ISSN: 1751-8628, 1751-8636
    Published: The Institution of Engineering and Technology 13.08.2015
    Published in IET communications (13.08.2015)
    “… It is shown that the key size is smaller than other code-based cryptosystems based on permutation and scrambling matrices…”
    Get full text
    Journal Article
  20. 20

    An asymmetric cryptography using Gaussian integers by Wanarat Juraphanthong, Suradet Jitprapaikulsarn

    ISSN: 2539-6161, 2539-6218
    Published: Khon Kaen University 11.06.2020
    “…In this paper, the already strong McEliece cryptosystem is enhanced with atwo-dimensional finite Gaussian integer. By substituting the one-dimensional linear…”
    Get full text
    Journal Article