Search Results - "Code based cryptosystem"
-
1
ADMM and Reproducing Sum-Product Decoding Algorithm Applied to QC-MDPC Code-Based McEliece Cryptosystems
ISSN: 0018-9448, 1557-9654Published: New York IEEE 01.03.2024Published in IEEE transactions on information theory (01.03.2024)“…QC-MDPC (quasi cyclic moderate density parity check) code-based McEliece cryptosystems are considered to be one of the candidates for post-quantum…”
Get full text
Journal Article -
2
A smart surveillance system utilizing modified federated machine learning: Gossip‐verifiable and quantum‐safe approach
ISSN: 1532-0626, 1532-0634Published: Hoboken, USA John Wiley & Sons, Inc 01.11.2024Published in Concurrency and computation (01.11.2024)“…Summary Edge computing has the capability to process data closer to its point of origin, leading to the development of critical autonomous infrastructures with…”
Get full text
Journal Article -
3
Ciphertext-Only Attack on Linear Feedback Shift Register-Based Esmaeili-Gulliver Cryptosystem
ISSN: 1089-7798Published: IEEE 01.05.2017Published in IEEE communications letters (01.05.2017)“…Esmaeili and Gulliver recently proposed a secret key cryptosystem based on error-correcting codes in which a codeword modified by random insertions, deletions,…”
Get full text
Journal Article -
4
A New Class of Q-Ary Codes for the McEliece Cryptosystem
ISSN: 2410-387X, 2410-387XPublished: MDPI AG 01.03.2021Published in Cryptography (01.03.2021)“…The McEliece cryptosystem is a promising candidate for post-quantum public-key encryption. In this work, we propose q-ary codes over Gaussian integers for the…”
Get full text
Journal Article -
5
Code-based security with random interleaving
ISSN: 1751-8628, 1751-8636Published: The Institution of Engineering and Technology 01.06.2017Published in IET communications (01.06.2017)“…In this paper, a new symmetric key cryptosystem based on linear codes is presented. Unlike most code-based cryptosystems, the code is known publicly. The…”
Get full text
Journal Article -
6
Efficient prevention technique for false data injection attack in smart grid
ISSN: 1938-1883Published: IEEE 01.05.2016Published in IEEE International Conference on Communications (2003) (01.05.2016)“…False data injection (FDI) attack is one of the severe attacks that threatens the smart grid's efficiency and reliability. Power grid's status is monitored by…”
Get full text
Conference Proceeding Journal Article -
7
Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages
ISSN: 2076-3417, 2076-3417Published: Basel MDPI AG 06.03.2020Published in Applied Sciences (06.03.2020)“…Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum…”
Get full text
Journal Article -
8
An Efficient Public Key Encryption Scheme Based on QC-MDPC Lattices
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 01.01.2017Published in IEEE access (01.01.2017)“…In this paper, we introduce a new family of lattices, namely QC-MDPC lattices, which are a special case of LDPC lattices, and an improved bit flipping…”
Get full text
Journal Article -
9
Joint channel coding-cryptography based on random insertions and deletions in quasi-cyclic-low-density parity check codes
ISSN: 1751-8628, 1751-8636Published: The Institution of Engineering and Technology 13.08.2015Published in IET communications (13.08.2015)“…In this paper, a new secure channel coding scheme is presented which randomly inserts and deletes bits in a codeword of a quasi-cyclic-low-density parity check…”
Get full text
Journal Article -
10
Geo Security using GPT Cryptosystem
ISSN: 2158-107X, 2156-5570Published: West Yorkshire Science and Information (SAI) Organization Limited 2020Published in International journal of advanced computer science & applications (2020)“…This paper describes an implementation of location-based encryption using a public key cryptosystem based on the rank error correcting codes. In any code based…”
Get full text
Journal Article -
11
An asymmetric cryptography using Gaussian integers
ISSN: 2539-6161, 2539-6218Published: Khon Kaen University 11.06.2020Published in Engineering and Applied Science Research (EASR) (11.06.2020)“…In this paper, the already strong McEliece cryptosystem is enhanced with atwo-dimensional finite Gaussian integer. By substituting the one-dimensional linear…”
Get full text
Journal Article -
12
New Code Based Fuzzy Extractor for Biometric Cryptography
ISBN: 9781538666098, 153866609XPublished: IEEE 01.10.2018Published in 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T) (01.10.2018)“…In this paper methods of forming cryptographic keys from biometric images using fuzzy extractors are considered. A new scheme of a fuzzy extractor based on the…”
Get full text
Conference Proceeding -
13
Improving Key Size and Bit-Security of Modified pqsigRM
ISSN: 2162-1241Published: IEEE 19.10.2022Published in International Conference on Information and Communication Technology Convergence (Print) (19.10.2022)“…The importance of post-quantum cryptography (PQC), which is secure against quantum algorithms, is growing larger. The pqsigRM is a code-based PQC digital…”
Get full text
Conference Proceeding -
14
On the use of code-based cryptography in automotive applications
Published: AEIT 17.11.2021Published in 2021 AEIT International Conference on Electrical and Electronic Technologies for Automotive (AEIT AUTOMOTIVE) (17.11.2021)“…Cybersecurity is a critical aspect for automotive applications. In this paper we approach this issue from a cryptographic point of view. In particular, we…”
Get full text
Conference Proceeding -
15
New Code-Based Cryptosystem Based on Binary Image of Generalized Reed-Solomon Code
ISSN: 2694-5215Published: IEEE 25.10.2021Published in International Symposium on Problems of Redundancy in Information and Control Systems (Online) (25.10.2021)“…McEliece cryptosystem represents a smart open key system based on the hardness of the decoding of an arbitrary linear code, which is believed to be able to…”
Get full text
Conference Proceeding -
16
McEliece cryptosystem based identification and signature scheme using chained BCH codes
Published: IEEE 01.12.2015Published in 2015 International Conference on Communications, Management and Telecommunications (ComManTel) (01.12.2015)“…Identity-based Public Key Cryptography ID-PKC allows to manage authentication of pubic key efficiently. Identification and signature scheme allow managing…”
Get full text
Conference Proceeding -
17
A Cipher Based on Prefix Codes
ISSN: 1424-8220, 1424-8220Published: Basel MDPI AG 17.09.2021Published in Sensors (Basel, Switzerland) (17.09.2021)“…A prefix code, a P-code, is a code where no codeword is a prefix of another codeword. In this paper, a symmetric cipher based on prefix codes is proposed. The…”
Get full text
Journal Article -
18
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism
ISSN: 1556-6013, 1556-6021Published: New York IEEE 01.01.2023Published in IEEE transactions on information forensics and security (01.01.2023)“…The evolution of quantum computers poses a serious threat to contemporary public-key encryption (PKE) schemes. To address this impending issue, the National…”
Get full text
Journal Article -
19
Deep learning-based biometric cryptographic key generation with post-quantum security
ISSN: 1573-7721, 1380-7501, 1573-7721Published: New York Springer US 01.06.2024Published in Multimedia tools and applications (01.06.2024)“…In contemporary digital security systems, the generation and management of cryptographic keys, such as passwords and pin codes, often rely on stochastic random…”
Get full text
Journal Article -
20
A Finite Regime Analysis of Information Set Decoding Algorithms
ISSN: 1999-4893, 1999-4893Published: Basel MDPI AG 01.10.2019Published in Algorithms (01.10.2019)“…Decoding of random linear block codes has been long exploited as a computationally hard problem on which it is possible to build secure asymmetric…”
Get full text
Journal Article

