Search Results - "Code-based cryptosystems"
-
1
On the security of two IKKR-type code-based cryptosystems: On the security of two IKKR-type code-based cryptosystems
ISSN: 0925-1022, 1573-7586Published: New York Springer US 01.11.2025Published in Designs, codes, and cryptography (01.11.2025)“…The paper analyzes the security of two recently proposed code-based cryptosystems that employ encryption of the form y = m G pub + e E pub : the Krouk–Kabatiansky–Tavernier (KKT…”
Get full text
Journal Article -
2
Security of generalised Reed–Solomon code-based cryptosystems
ISSN: 1751-8709, 1751-8717Published: The Institution of Engineering and Technology 01.07.2019Published in IET information security (01.07.2019)“…In this study, the authors elaborate on a recently proposed variant of the public-key McEliece and Niederreiter cryptosystems using generalised Reed–Solomon…”
Get full text
Journal Article -
3
New code-based cryptosystems via the IKKR framework
ISSN: 2214-2126Published: Elsevier Ltd 01.08.2023Published in Journal of information security and applications (01.08.2023)“…One main construct for code-based public key cryptosystems is the McEliece framework that hedges upon the hardness of decoding arbitrary linear codes. Based on…”
Get full text
Journal Article -
4
Complexity of statistical attacks on QC-LDPC code-based cryptosystems
ISSN: 1751-8709, 1751-8717Published: The Institution of Engineering and Technology 01.05.2020Published in IET information security (01.05.2020)“…Public-key cryptosystems built on quasi-cyclic (QC) low-density parity-check and moderate-density parity-check codes are promising candidates for post-quantum…”
Get full text
Journal Article -
5
Post-Quantum Cryptosystems: Open Problems and Current Solutions. Isogeny-Based and Code-Based Cryptosystems
ISSN: 1990-4789, 1990-4797Published: Moscow Pleiades Publishing 01.03.2024Published in Journal of applied and industrial mathematics (01.03.2024)“… Special attention is paid to cryptanalysis of these schemes. In particular, for code-based cryptosystems we describe the information set decoding and the support…”
Get full text
Journal Article -
6
Post-Quantum Cryptosystems: Open Problemsand Current Solutions. Isogeny-Basedand Code-Based Cryptosystems
ISSN: 1990-4789, 1990-4797Published: Dordrecht Springer Nature B.V 01.01.2024Published in Journal of applied and industrial mathematics (01.01.2024)“… Special attention is paid to cryptanalysis of these schemes. In particular, for code-based cryptosystems we describe the information set decoding and the support…”
Get full text
Journal Article -
7
A toolbox for software optimization of QC-MDPC code-based cryptosystems
ISSN: 2190-8508, 2190-8516Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.11.2019Published in Journal of cryptographic engineering (01.11.2019)“… even with large-scale quantum computers. One example is the family of code-based cryptosystems that relies on the syndrome decoding problem…”
Get full text
Journal Article -
8
Connecting the Complexity of MQ- and Code-Based Cryptosystems
ISSN: 1210-3195, 1210-3195, 1338-9750Published: Bratislava De Gruyter Open 26.09.2017Published in Tatra Mountains mathematical publications (26.09.2017)“…We study the connection between the MQ problem and the decoding problem, through the intermediate MRHS representation. The main goal of this study is to…”
Get full text
Journal Article -
9
Scaling efficient code-based cryptosystems for embedded platforms
ISSN: 2190-8508, 2190-8516Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2014Published in Journal of cryptographic engineering (01.06.2014)“…We describe a family of efficient codes for cryptographic purposes and dedicated algorithms for their manipulation. Our proposal is especially tailored for…”
Get full text
Journal Article -
10
Post Quantum Code-Based Cryptosystems with Dual Inverse Matrix
Published: IEEE 03.08.2023Published in 2023 13th International Conference on Information Technology in Asia (CITA) (03.08.2023)“… However, code-based cryptography has been shown to be resistant to these attacks. To date, no polynomial-time attack exists that can break code-based cryptosystems such as the McEliece cryptosystem…”
Get full text
Conference Proceeding -
11
Code-Based Cryptosystems Evolution
Published: IEEE 01.11.2017Published in 2017 IVth International Conference on Engineering and Telecommunication (EnT) (01.11.2017)“…This paper describes the original linear code-based cryptosystem and shows how it evolves after successful structural-based attacks have been discovered…”
Get full text
Conference Proceeding -
12
Code-based cryptosystems from NIST PQC
Published: IEEE 01.05.2018Published in 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) (01.05.2018)“…In this paper we research code-based electronic digital signature schemes, which ware submitted to the contest of post-quantum crypto algorithms NIST PQC…”
Get full text
Conference Proceeding -
13
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism
ISSN: 1556-6013, 1556-6021Published: New York IEEE 01.01.2023Published in IEEE transactions on information forensics and security (01.01.2023)“…The evolution of quantum computers poses a serious threat to contemporary public-key encryption (PKE) schemes. To address this impending issue, the National…”
Get full text
Journal Article -
14
NIST PQC: Code-Based Cryptosystems
ISSN: 0485-8972, 2786-5525Published: 28.12.2018Published in Radiotekhnika (28.12.2018)“…The code-based schemes, which were submitted to the contest of post-quantum crypto algorithms NIST PQC, are studied in this work. The general characteristics…”
Get full text
Journal Article -
15
Deep learning-based biometric cryptographic key generation with post-quantum security
ISSN: 1573-7721, 1380-7501, 1573-7721Published: New York Springer US 01.06.2024Published in Multimedia tools and applications (01.06.2024)“…In contemporary digital security systems, the generation and management of cryptographic keys, such as passwords and pin codes, often rely on stochastic random…”
Get full text
Journal Article -
16
A Finite Regime Analysis of Information Set Decoding Algorithms
ISSN: 1999-4893, 1999-4893Published: Basel MDPI AG 01.10.2019Published in Algorithms (01.10.2019)“…Decoding of random linear block codes has been long exploited as a computationally hard problem on which it is possible to build secure asymmetric…”
Get full text
Journal Article -
17
An Algebraic Attack on Rank Metric Code-Based Cryptosystems
ISSN: 2331-8422Published: Ithaca Cornell University Library, arXiv.org 23.02.2020Published in arXiv.org (23.02.2020)“…The Rank metric decoding problem is the main problem considered in cryptography based on codes in the rank metric. Very efficient schemes based on this problem…”
Get full text
Paper -
18
On the Question of the Resistance of Code-Based Cryptosystems to Matrix Density Reduction Attacks
Published: IEEE 31.05.2021Published in 2021 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF) (31.05.2021)“…Methods for reducing the density of matrices are discussed. These methods can be used to analyze the cryptocomplexity of systems based on error-correcting…”
Get full text
Conference Proceeding -
19
PolarSig: An efficient digital signature based on polar codes
ISSN: 1751-8628, 1751-8636Published: The Institution of Engineering and Technology 27.10.2020Published in IET communications (27.10.2020)“… Large public key size is inherent in almost all the code-based cryptosystems and other post-quantum alternatives…”
Get full text
Journal Article -
20
Codes in a Dihedral Group Algebra
ISSN: 0146-4116, 1558-108XPublished: Moscow Pleiades Publishing 01.12.2019Published in Automatic control and computer sciences (01.12.2019)“…In 1978, Robert McEliece constructed the first asymmetric code-based cryptosystem using noise-immune Goppa codes…”
Get full text
Journal Article