Search Results - "Code-based cryptosystems"

Refine Results
  1. 1

    On the security of two IKKR-type code-based cryptosystems: On the security of two IKKR-type code-based cryptosystems by Vedenev, Kirill

    ISSN: 0925-1022, 1573-7586
    Published: New York Springer US 01.11.2025
    Published in Designs, codes, and cryptography (01.11.2025)
    “…The paper analyzes the security of two recently proposed code-based cryptosystems that employ encryption of the form y = m G pub + e E pub : the Krouk–Kabatiansky–Tavernier (KKT…”
    Get full text
    Journal Article
  2. 2

    Security of generalised Reed–Solomon code-based cryptosystems by Baldi, Marco, Chiaraluce, Franco, Rosenthal, Joachim, Santini, Paolo, Schipani, Davide

    ISSN: 1751-8709, 1751-8717
    Published: The Institution of Engineering and Technology 01.07.2019
    Published in IET information security (01.07.2019)
    “…In this study, the authors elaborate on a recently proposed variant of the public-key McEliece and Niederreiter cryptosystems using generalised Reed–Solomon…”
    Get full text
    Journal Article
  3. 3

    New code-based cryptosystems via the IKKR framework by Lau, Terry Shue Chien, Ivanov, Fedor, Ariffin, Muhammad Rezal Kamel, Chin, Ji-Jian, Yap, Timothy Tzen Vun

    ISSN: 2214-2126
    Published: Elsevier Ltd 01.08.2023
    “…One main construct for code-based public key cryptosystems is the McEliece framework that hedges upon the hardness of decoding arbitrary linear codes. Based on…”
    Get full text
    Journal Article
  4. 4

    Complexity of statistical attacks on QC-LDPC code-based cryptosystems by Santini, Paolo, Baldi, Marco, Chiaraluce, Franco

    ISSN: 1751-8709, 1751-8717
    Published: The Institution of Engineering and Technology 01.05.2020
    Published in IET information security (01.05.2020)
    “…Public-key cryptosystems built on quasi-cyclic (QC) low-density parity-check and moderate-density parity-check codes are promising candidates for post-quantum…”
    Get full text
    Journal Article
  5. 5

    Post-Quantum Cryptosystems: Open Problems and Current Solutions. Isogeny-Based and Code-Based Cryptosystems by Malygina, E. S., Kutsenko, A. V., Novoselov, S. A., Kolesnikov, N. S., Bakharev, A. O., Khilchuk, I. S., Shaporenko, A. S., Tokareva, N. N.

    ISSN: 1990-4789, 1990-4797
    Published: Moscow Pleiades Publishing 01.03.2024
    “… Special attention is paid to cryptanalysis of these schemes. In particular, for code-based cryptosystems we describe the information set decoding and the support…”
    Get full text
    Journal Article
  6. 6

    Post-Quantum Cryptosystems: Open Problemsand Current Solutions. Isogeny-Basedand Code-Based Cryptosystems by Malygina, E. S, Kutsenko, A. V, Novoselov, S. A, Kolesnikov, N. S, Bakharev, A. O, Khilchuk, I. S, Shaporenko, A. S, Tokareva, N. N

    ISSN: 1990-4789, 1990-4797
    Published: Dordrecht Springer Nature B.V 01.01.2024
    “… Special attention is paid to cryptanalysis of these schemes. In particular, for code-based cryptosystems we describe the information set decoding and the support…”
    Get full text
    Journal Article
  7. 7

    A toolbox for software optimization of QC-MDPC code-based cryptosystems by Drucker, Nir, Gueron, Shay

    ISSN: 2190-8508, 2190-8516
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.11.2019
    Published in Journal of cryptographic engineering (01.11.2019)
    “… even with large-scale quantum computers. One example is the family of code-based cryptosystems that relies on the syndrome decoding problem…”
    Get full text
    Journal Article
  8. 8

    Connecting the Complexity of MQ- and Code-Based Cryptosystems by Zajac, Pavol

    ISSN: 1210-3195, 1210-3195, 1338-9750
    Published: Bratislava De Gruyter Open 26.09.2017
    Published in Tatra Mountains mathematical publications (26.09.2017)
    “…We study the connection between the MQ problem and the de­coding problem, through the intermediate MRHS representation. The main goal of this study is to…”
    Get full text
    Journal Article
  9. 9

    Scaling efficient code-based cryptosystems for embedded platforms by Biasi, Felipe P., Barreto, Paulo S. L. M., Misoczki, Rafael, Ruggiero, Wilson V.

    ISSN: 2190-8508, 2190-8516
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2014
    Published in Journal of cryptographic engineering (01.06.2014)
    “…We describe a family of efficient codes for cryptographic purposes and dedicated algorithms for their manipulation. Our proposal is especially tailored for…”
    Get full text
    Journal Article
  10. 10

    Post Quantum Code-Based Cryptosystems with Dual Inverse Matrix by Makoui, Farshid Haidary, Gulliver, T. Aaron, Dakhilalian, Mohammad

    Published: IEEE 03.08.2023
    “… However, code-based cryptography has been shown to be resistant to these attacks. To date, no polynomial-time attack exists that can break code-based cryptosystems such as the McEliece cryptosystem…”
    Get full text
    Conference Proceeding
  11. 11

    Code-Based Cryptosystems Evolution by Samokhina, Marina, Trushina, Oksana

    Published: IEEE 01.11.2017
    “…This paper describes the original linear code-based cryptosystem and shows how it evolves after successful structural-based attacks have been discovered…”
    Get full text
    Conference Proceeding
  12. 12

    Code-based cryptosystems from NIST PQC by Kuznetsov, Alexandr, Kiian, Anastasiia, Lutsenko, Mariia, Chepurko, Iryna, Kavun, Sergii

    Published: IEEE 01.05.2018
    “…In this paper we research code-based electronic digital signature schemes, which ware submitted to the contest of post-quantum crypto algorithms NIST PQC…”
    Get full text
    Conference Proceeding
  13. 13

    Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism by Nosouhi, Mohammad Reza, Shah, Syed W., Pan, Lei, Zolotavkin, Yevhen, Nanda, Ashish, Gauravaram, Praveen, Doss, Robin

    ISSN: 1556-6013, 1556-6021
    Published: New York IEEE 01.01.2023
    “…The evolution of quantum computers poses a serious threat to contemporary public-key encryption (PKE) schemes. To address this impending issue, the National…”
    Get full text
    Journal Article
  14. 14

    NIST PQC: Code-Based Cryptosystems by Kuznetsov, А.А., Gorbenko, Yu.I., Lutsenko, М.S., Prokopovych-Tkachenko, D.I., Pastukhov, M.V.

    ISSN: 0485-8972, 2786-5525
    Published: 28.12.2018
    Published in Radiotekhnika (28.12.2018)
    “…The code-based schemes, which were submitted to the contest of post-quantum crypto algorithms NIST PQC, are studied in this work. The general characteristics…”
    Get full text
    Journal Article
  15. 15

    Deep learning-based biometric cryptographic key generation with post-quantum security by Kuznetsov, Oleksandr, Zakharov, Dmytro, Frontoni, Emanuele

    ISSN: 1573-7721, 1380-7501, 1573-7721
    Published: New York Springer US 01.06.2024
    Published in Multimedia tools and applications (01.06.2024)
    “…In contemporary digital security systems, the generation and management of cryptographic keys, such as passwords and pin codes, often rely on stochastic random…”
    Get full text
    Journal Article
  16. 16

    A Finite Regime Analysis of Information Set Decoding Algorithms by Baldi, Marco, Barenghi, Alessandro, Chiaraluce, Franco, Pelosi, Gerardo, Santini, Paolo

    ISSN: 1999-4893, 1999-4893
    Published: Basel MDPI AG 01.10.2019
    Published in Algorithms (01.10.2019)
    “…Decoding of random linear block codes has been long exploited as a computationally hard problem on which it is possible to build secure asymmetric…”
    Get full text
    Journal Article
  17. 17

    An Algebraic Attack on Rank Metric Code-Based Cryptosystems by Bardet, Magali, Briaud, Pierre, Bros, Maxime, Gaborit, Philippe, Neiger, Vincent, Ruatta, Olivier, Tillich, Jean-Pierre

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 23.02.2020
    Published in arXiv.org (23.02.2020)
    “…The Rank metric decoding problem is the main problem considered in cryptography based on codes in the rank metric. Very efficient schemes based on this problem…”
    Get full text
    Paper
  18. 18

    On the Question of the Resistance of Code-Based Cryptosystems to Matrix Density Reduction Attacks by Veselova, V. A., Ovchinnikov, A. A., Veresova, A. M.

    Published: IEEE 31.05.2021
    “…Methods for reducing the density of matrices are discussed. These methods can be used to analyze the cryptocomplexity of systems based on error-correcting…”
    Get full text
    Conference Proceeding
  19. 19

    PolarSig: An efficient digital signature based on polar codes by Forghani, Pouyan, Koochak Shooshtari, Masoumeh, Aref, Mohammad Reza

    ISSN: 1751-8628, 1751-8636
    Published: The Institution of Engineering and Technology 27.10.2020
    Published in IET communications (27.10.2020)
    “… Large public key size is inherent in almost all the code-based cryptosystems and other post-quantum alternatives…”
    Get full text
    Journal Article
  20. 20

    Codes in a Dihedral Group Algebra by Vedenev, K. V., Deundyak, V. M.

    ISSN: 0146-4116, 1558-108X
    Published: Moscow Pleiades Publishing 01.12.2019
    Published in Automatic control and computer sciences (01.12.2019)
    “…In 1978, Robert McEliece constructed the first asymmetric code-based cryptosystem using noise-immune Goppa codes…”
    Get full text
    Journal Article