Search Results - "Code-based cryptography"

Refine Results
  1. 1

    Efficient Encryption From Random Quasi-Cyclic Codes by Aguilar-Melchor, Carlos, Blazy, Olivier, Deneuville, Jean-Christophe, Gaborit, Philippe, Zemor, Gilles

    ISSN: 0018-9448, 1557-9654
    Published: New York IEEE 01.05.2018
    Published in IEEE transactions on information theory (01.05.2018)
    “…We propose a framework for constructing efficient code-based encryption schemes that do not hide any structure in their public matrix. The framework is in the…”
    Get full text
    Journal Article
  2. 2

    Post-quantum cryptography Algorithm's standardization and performance analysis by Kumar, Manish

    ISSN: 2590-0056, 2590-0056
    Published: Elsevier Inc 01.09.2022
    Published in Array (New York) (01.09.2022)
    “…-Quantum computer is no longer a hypothetical idea. It is the world's most important technology and there is a race among countries to get supremacy in quantum…”
    Get full text
    Journal Article
  3. 3

    Efficient code-based fully dynamic group signature scheme by Wang, Luping, Chen, Jie, Dai, Huan, Tao, Chongben

    ISSN: 0304-3975, 1879-2294
    Published: Elsevier B.V 01.04.2024
    Published in Theoretical computer science (01.04.2024)
    “…Code-based group signature is an important research topic in recent years. Since the pioneering work by Alamélou et al.(WCC 2015), several other schemes have…”
    Get full text
    Journal Article
  4. 4

    MODRED: A code-based non-interactive key exchange protocol by Pei, Junling, Fu, Fang-Wei

    ISSN: 0304-3975
    Published: Elsevier B.V 21.12.2024
    Published in Theoretical computer science (21.12.2024)
    “…How to construct a non-interactive key exchange (NIKE) protocol based on coding theory is an opening problem. In this paper, we propose the first code-based…”
    Get full text
    Journal Article
  5. 5

    Optimizing Code-Based Cryptography for Efficient and Secure Post-Quantum Key Agreement by Iqbal, Syed Shamikh, Zafar, Aasim

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2025
    Published in Procedia computer science (2025)
    “…Due to the quantum computing threat, RSA and ECC cryptography are at risk, necessitating the need for post-quantum cryptography. Code-based cryptographic…”
    Get full text
    Journal Article
  6. 6

    ECC2: Error correcting code and elliptic curve based cryptosystem by Zhang, Fangguo, Zhang, Zhuoran, Guan, Peidong

    ISSN: 0020-0255, 1872-6291
    Published: Elsevier Inc 01.07.2020
    Published in Information sciences (01.07.2020)
    “…•We reconsider the use of algebraic geometry codes in cryptography.•Applying list decoding algorithms to get smaller key size.•An algorithm to generate secure…”
    Get full text
    Journal Article
  7. 7

    A new McEliece-type cryptosystem using Gabidulin-Kronecker product codes by Sun, Zhe, Zhuang, Jincheng, Zhou, Zimeng, Fu, Fang-Wei

    ISSN: 0304-3975, 1879-2294
    Published: Elsevier B.V 01.05.2024
    Published in Theoretical computer science (01.05.2024)
    “…This paper presents a new McEliece-type cryptosystem using Gabidulin-Kronecker product codes in the rank metric. The contributions of this paper are as…”
    Get full text
    Journal Article
  8. 8

    Complete and Improved FPGA Implementation of Classic McEliece by Chen, Po-Jen, Chou, Tung, Deshpande, Sanjay, Lahr, Norman, Niederhagen, Ruben, Szefer, Jakub, Wang, Wen

    ISSN: 2569-2925, 2569-2925
    Published: Ruhr-Universität Bochum 08.06.2022
    “…We present the first specification-compliant constant-time FPGA implementation of the Classic McEliece cryptosystem from the third-round of NIST’s Post-Quantum…”
    Get full text
    Journal Article
  9. 9

    Polynomial Time Key-Recovery Attack on High Rate Random Alternant Codes by Bardet, Magali, Mora, Rocco, Tillich, Jean-Pierre

    ISSN: 0018-9448, 1557-9654
    Published: New York IEEE 01.06.2024
    Published in IEEE transactions on information theory (01.06.2024)
    “…A long standing open question is whether the distinguisher of high rate alternant codes or Goppa codes from Faugère, Gauthier-Uma na, Otmani, Perret, and…”
    Get full text
    Journal Article
  10. 10

    Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation by Drăgoi, Vlad-Florin, Colombier, Brice, Vallet, Nicolas, Cayrel, Pierre-Louis, Grosso, Vincent

    ISSN: 2569-2925, 2569-2925
    Published: IACR 09.12.2025
    “…Classic McEliece is one of the three code-based candidates in the fourth round of the NIST post-quantum cryptography standardization process in the Key…”
    Get full text
    Journal Article
  11. 11

    Breaking and Improving a Lattice-Code-Based Cryptosystem by Li, Ling, Xing, and Yeo by Athukorala, Pabasara, Galbraith, Steven D.

    ISSN: 0018-9448, 1557-9654
    Published: IEEE 01.09.2025
    Published in IEEE transactions on information theory (01.09.2025)
    “…Li, Ling, Xing, and Yeo (LLXY) have proposed a code-based encryption scheme based on factoring in finite fields. The security of the scheme relies on both the…”
    Get full text
    Journal Article
  12. 12

    Blockwise Rank Decoding Problem and LRPC Codes: Cryptosystems With Smaller Sizes by Song, Yongcheng, Zhang, Jiang, Huang, Xinyi, Wu, Wei

    ISSN: 0018-9448, 1557-9654
    Published: IEEE 01.06.2025
    Published in IEEE transactions on information theory (01.06.2025)
    “…In this paper, we initiate the study of the Rank Decoding (RD) problem and Low Rank Parity Check (LRPC) codes with blockwise structure in rank-based…”
    Get full text
    Journal Article
  13. 13

    A New Sieving-Style Information-Set Decoding Algorithm by Guo, Qian, Johansson, Thomas, Nguyen, Vu

    ISSN: 0018-9448, 1557-9654, 1557-9654
    Published: IEEE 01.11.2024
    Published in IEEE transactions on information theory (01.11.2024)
    “…The problem of decoding random codes is a fundamental problem for code-based cryptography, including recent code-based candidates in the NIST post-quantum…”
    Get full text
    Journal Article
  14. 14

    Analysis of code-based digital signature schemes by Khurana, Rupali, Narwal, Ekta

    ISSN: 2088-8708, 2722-2578
    Published: 01.10.2023
    “…Digital signatures are in high demand because they allow authentication and non-repudiation. Existing digital signature systems, such as digital signature…”
    Get full text
    Journal Article
  15. 15

    Statistical zero-knowledge and analysis of rank-metric zero-knowledge proofs of knowledge by Song, Yongcheng, Zhang, Jiang, Huang, Xinyi, Wu, Wei, Yang, Haining

    ISSN: 0304-3975, 1879-2294
    Published: Elsevier B.V 31.03.2023
    Published in Theoretical computer science (31.03.2023)
    “…A series of Stern-like Code-Based Zero-Knowledge Proofs of Knowledge (CBZKPoKs) in the rank setting have been proposed since 2011. These CBZKPoKs (RStern,…”
    Get full text
    Journal Article
  16. 16

    Efficient and Scalable FPGA Design of GF( 2^m2m) Inversion for Post-Quantum Cryptosystems by Galimberti, Andrea, Montanaro, Gabriele, Zoni, Davide

    ISSN: 0018-9340, 1557-9956
    Published: New York IEEE 01.12.2022
    Published in IEEE transactions on computers (01.12.2022)
    “…Post-quantum cryptosystems based on QC-MDPC codes are designed to mitigate the security threat posed by quantum computers to traditional public-key…”
    Get full text
    Journal Article
  17. 17

    Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions by Balamurugan, Chithralekha, Singh, Kalpana, Ganesan, Ganeshvani, Rajarajan, Muttukrishnan

    ISSN: 2410-387X, 2410-387X
    Published: Basel MDPI AG 01.12.2021
    Published in Cryptography (01.12.2021)
    “…Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit. Thus, cryptography research has…”
    Get full text
    Journal Article
  18. 18

    Generalized Low-Rank Parity-Check Codes by Franch, Ermes, Gaborit, Philippe, Li, Chunlei

    ISSN: 0018-9448, 1557-9654
    Published: IEEE 01.08.2024
    Published in IEEE transactions on information theory (01.08.2024)
    “…Let <inline-formula> <tex-math notation="LaTeX">\mathbb {F}_{q} </tex-math></inline-formula> be the finite field with q elements and m be a positive integer…”
    Get full text
    Journal Article
  19. 19

    Fast Hardware Architecture With Efficient Matrix Computations for the Key Generation of Classic McEliece by Zhang, Haochen, Qiao, Xinyuan, Tian, Jing, Song, Suwen, Wang, Zhongfeng

    ISSN: 1549-8328, 1558-0806
    Published: New York IEEE 01.03.2025
    “…Classic McEliece, with a remarkably stable security level, has been selected as one of the four key-establishment algorithms in the fourth-round evaluation of…”
    Get full text
    Journal Article
  20. 20

    An Efficient and Unified RTL Accelerator Design for HQC-128, HQC-192, and HQC-256 by Antognazza, Francesco, Barenghi, Alessandro, Pelosi, Gerardo

    ISSN: 0018-9340, 1557-9956
    Published: IEEE 01.07.2025
    Published in IEEE transactions on computers (01.07.2025)
    “…In the Post-Quantum Standardization (PQC) process held by the National Institute of Standards and Technology (NIST), the final round of evaluation of the…”
    Get full text
    Journal Article