Search Results - "Code-based cryptosystem"

Refine Results
  1. 1

    ADMM and Reproducing Sum-Product Decoding Algorithm Applied to QC-MDPC Code-Based McEliece Cryptosystems by Watanabe, Kohtaro, Ohtsuka, Motonari, Tsukie, Yuta

    ISSN: 0018-9448, 1557-9654
    Published: New York IEEE 01.03.2024
    Published in IEEE transactions on information theory (01.03.2024)
    “…QC-MDPC (quasi cyclic moderate density parity check) code-based McEliece cryptosystems are considered to be one of the candidates for post-quantum…”
    Get full text
    Journal Article
  2. 2

    A smart surveillance system utilizing modified federated machine learning: Gossip‐verifiable and quantum‐safe approach by Dharani, Dharmaraj, Anitha Kumari, Kumarasamy

    ISSN: 1532-0626, 1532-0634
    Published: Hoboken, USA John Wiley & Sons, Inc 01.11.2024
    Published in Concurrency and computation (01.11.2024)
    “…Summary Edge computing has the capability to process data closer to its point of origin, leading to the development of critical autonomous infrastructures with…”
    Get full text
    Journal Article
  3. 3

    Ciphertext-Only Attack on Linear Feedback Shift Register-Based Esmaeili-Gulliver Cryptosystem by Lee, Yongwoo, Kim, Young-Sik, No, Jong-Seon

    ISSN: 1089-7798
    Published: IEEE 01.05.2017
    Published in IEEE communications letters (01.05.2017)
    “…Esmaeili and Gulliver recently proposed a secret key cryptosystem based on error-correcting codes in which a codeword modified by random insertions, deletions,…”
    Get full text
    Journal Article
  4. 4

    A New Class of Q-Ary Codes for the McEliece Cryptosystem by Freudenberger, Jürgen, Thiers, Johann-Philipp

    ISSN: 2410-387X, 2410-387X
    Published: MDPI AG 01.03.2021
    Published in Cryptography (01.03.2021)
    “…The McEliece cryptosystem is a promising candidate for post-quantum public-key encryption. In this work, we propose q-ary codes over Gaussian integers for the…”
    Get full text
    Journal Article
  5. 5

    Code-based security with random interleaving by Esmaeili, Mostafa, Gulliver, Thomas Aaron

    ISSN: 1751-8628, 1751-8636
    Published: The Institution of Engineering and Technology 01.06.2017
    Published in IET communications (01.06.2017)
    “…In this paper, a new symmetric key cryptosystem based on linear codes is presented. Unlike most code-based cryptosystems, the code is known publicly. The…”
    Get full text
    Journal Article
  6. 6

    Efficient prevention technique for false data injection attack in smart grid by Abdallah, Asmaa, Xuemin Shen

    ISSN: 1938-1883
    Published: IEEE 01.05.2016
    “…False data injection (FDI) attack is one of the severe attacks that threatens the smart grid's efficiency and reliability. Power grid's status is monitored by…”
    Get full text
    Conference Proceeding Journal Article
  7. 7

    Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages by Park, ByeongGyu, Kim, Suhri, Hong, Seokhie, Kim, HeeSeok, Seo, Seog Chung

    ISSN: 2076-3417, 2076-3417
    Published: Basel MDPI AG 06.03.2020
    Published in Applied Sciences (06.03.2020)
    “…Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum…”
    Get full text
    Journal Article
  8. 8

    An Efficient Public Key Encryption Scheme Based on QC-MDPC Lattices by Bagheri, Khadijeh, Sadeghi, Mohammad-Reza, Eghlidos, Taraneh

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 01.01.2017
    Published in IEEE access (01.01.2017)
    “…In this paper, we introduce a new family of lattices, namely QC-MDPC lattices, which are a special case of LDPC lattices, and an improved bit flipping…”
    Get full text
    Journal Article
  9. 9

    Joint channel coding-cryptography based on random insertions and deletions in quasi-cyclic-low-density parity check codes by Esmaeili, Mostafa, Gulliver, T. Aaron

    ISSN: 1751-8628, 1751-8636
    Published: The Institution of Engineering and Technology 13.08.2015
    Published in IET communications (13.08.2015)
    “…In this paper, a new secure channel coding scheme is presented which randomly inserts and deletes bits in a codeword of a quasi-cyclic-low-density parity check…”
    Get full text
    Journal Article
  10. 10

    Geo Security using GPT Cryptosystem by Khan, Eraj, Khalid, Abbas, Ali, Arshad, Atif, Muhammad, Salman, Ahmad

    ISSN: 2158-107X, 2156-5570
    Published: West Yorkshire Science and Information (SAI) Organization Limited 2020
    “…This paper describes an implementation of location-based encryption using a public key cryptosystem based on the rank error correcting codes. In any code based…”
    Get full text
    Journal Article
  11. 11

    An asymmetric cryptography using Gaussian integers by Wanarat Juraphanthong, Suradet Jitprapaikulsarn

    ISSN: 2539-6161, 2539-6218
    Published: Khon Kaen University 11.06.2020
    “…In this paper, the already strong McEliece cryptosystem is enhanced with atwo-dimensional finite Gaussian integer. By substituting the one-dimensional linear…”
    Get full text
    Journal Article
  12. 12

    New Code Based Fuzzy Extractor for Biometric Cryptography by Kuznetsov, Alexandr, Kiyan, Anastasia, Uvarova, Anna, Serhiienko, Roman, Smirnov, Valeriy

    ISBN: 9781538666098, 153866609X
    Published: IEEE 01.10.2018
    “…In this paper methods of forming cryptographic keys from biometric images using fuzzy extractors are considered. A new scheme of a fuzzy extractor based on the…”
    Get full text
    Conference Proceeding
  13. 13

    Improving Key Size and Bit-Security of Modified pqsigRM by Cho, Jinkyu, Lee, Yongwoo, Koo, Zahyun, No, Jong-Seon, Kim, Young-Sik

    ISSN: 2162-1241
    Published: IEEE 19.10.2022
    “…The importance of post-quantum cryptography (PQC), which is secure against quantum algorithms, is growing larger. The pqsigRM is a code-based PQC digital…”
    Get full text
    Conference Proceeding
  14. 14

    On the use of code-based cryptography in automotive applications by Battaglioni, Massimo, Cancellieri, Giovanni, Santini, Paolo

    Published: AEIT 17.11.2021
    “…Cybersecurity is a critical aspect for automotive applications. In this paper we approach this issue from a cryptographic point of view. In particular, we…”
    Get full text
    Conference Proceeding
  15. 15

    New Code-Based Cryptosystem Based on Binary Image of Generalized Reed-Solomon Code by Ivanov, Fedor, Krouk, Eugenii, Zyablov, Victor

    ISSN: 2694-5215
    Published: IEEE 25.10.2021
    “…McEliece cryptosystem represents a smart open key system based on the hardness of the decoding of an arbitrary linear code, which is believed to be able to…”
    Get full text
    Conference Proceeding
  16. 16

    McEliece cryptosystem based identification and signature scheme using chained BCH codes by Le Van, Thai, Hoan, Pham Khac

    Published: IEEE 01.12.2015
    “…Identity-based Public Key Cryptography ID-PKC allows to manage authentication of pubic key efficiently. Identification and signature scheme allow managing…”
    Get full text
    Conference Proceeding
  17. 17

    A Cipher Based on Prefix Codes by Grošek, Otokar, Hromada, Viliam, Horák, Peter

    ISSN: 1424-8220, 1424-8220
    Published: Basel MDPI AG 17.09.2021
    Published in Sensors (Basel, Switzerland) (17.09.2021)
    “…A prefix code, a P-code, is a code where no codeword is a prefix of another codeword. In this paper, a symmetric cipher based on prefix codes is proposed. The…”
    Get full text
    Journal Article
  18. 18

    Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism by Nosouhi, Mohammad Reza, Shah, Syed W., Pan, Lei, Zolotavkin, Yevhen, Nanda, Ashish, Gauravaram, Praveen, Doss, Robin

    ISSN: 1556-6013, 1556-6021
    Published: New York IEEE 01.01.2023
    “…The evolution of quantum computers poses a serious threat to contemporary public-key encryption (PKE) schemes. To address this impending issue, the National…”
    Get full text
    Journal Article
  19. 19

    Deep learning-based biometric cryptographic key generation with post-quantum security by Kuznetsov, Oleksandr, Zakharov, Dmytro, Frontoni, Emanuele

    ISSN: 1573-7721, 1380-7501, 1573-7721
    Published: New York Springer US 01.06.2024
    Published in Multimedia tools and applications (01.06.2024)
    “…In contemporary digital security systems, the generation and management of cryptographic keys, such as passwords and pin codes, often rely on stochastic random…”
    Get full text
    Journal Article
  20. 20

    A Finite Regime Analysis of Information Set Decoding Algorithms by Baldi, Marco, Barenghi, Alessandro, Chiaraluce, Franco, Pelosi, Gerardo, Santini, Paolo

    ISSN: 1999-4893, 1999-4893
    Published: Basel MDPI AG 01.10.2019
    Published in Algorithms (01.10.2019)
    “…Decoding of random linear block codes has been long exploited as a computationally hard problem on which it is possible to build secure asymmetric…”
    Get full text
    Journal Article