Search Results - "Code-based cryptosystems"

Refine Results
  1. 1

    Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism by Nosouhi, Mohammad Reza, Shah, Syed W., Pan, Lei, Zolotavkin, Yevhen, Nanda, Ashish, Gauravaram, Praveen, Doss, Robin

    ISSN: 1556-6013, 1556-6021
    Published: New York IEEE 01.01.2023
    “…The evolution of quantum computers poses a serious threat to contemporary public-key encryption (PKE) schemes. To address this impending issue, the National…”
    Get full text
    Journal Article
  2. 2

    Deep learning-based biometric cryptographic key generation with post-quantum security by Kuznetsov, Oleksandr, Zakharov, Dmytro, Frontoni, Emanuele

    ISSN: 1573-7721, 1380-7501, 1573-7721
    Published: New York Springer US 01.06.2024
    Published in Multimedia tools and applications (01.06.2024)
    “…In contemporary digital security systems, the generation and management of cryptographic keys, such as passwords and pin codes, often rely on stochastic random…”
    Get full text
    Journal Article
  3. 3

    A Finite Regime Analysis of Information Set Decoding Algorithms by Baldi, Marco, Barenghi, Alessandro, Chiaraluce, Franco, Pelosi, Gerardo, Santini, Paolo

    ISSN: 1999-4893, 1999-4893
    Published: Basel MDPI AG 01.10.2019
    Published in Algorithms (01.10.2019)
    “…Decoding of random linear block codes has been long exploited as a computationally hard problem on which it is possible to build secure asymmetric…”
    Get full text
    Journal Article
  4. 4

    PolarSig: An efficient digital signature based on polar codes by Forghani, Pouyan, Koochak Shooshtari, Masoumeh, Aref, Mohammad Reza

    ISSN: 1751-8628, 1751-8636
    Published: The Institution of Engineering and Technology 27.10.2020
    Published in IET communications (27.10.2020)
    “…Code-based digital signatures suffer from two main drawbacks: large public key size and slow signature generation. Large public key size is inherent in almost…”
    Get full text
    Journal Article
  5. 5

    Security of generalised Reed–Solomon code-based cryptosystems by Baldi, Marco, Chiaraluce, Franco, Rosenthal, Joachim, Santini, Paolo, Schipani, Davide

    ISSN: 1751-8709, 1751-8717
    Published: The Institution of Engineering and Technology 01.07.2019
    Published in IET information security (01.07.2019)
    “…In this study, the authors elaborate on a recently proposed variant of the public-key McEliece and Niederreiter cryptosystems using generalised Reed–Solomon…”
    Get full text
    Journal Article
  6. 6

    Codes in a Dihedral Group Algebra by Vedenev, K. V., Deundyak, V. M.

    ISSN: 0146-4116, 1558-108X
    Published: Moscow Pleiades Publishing 01.12.2019
    Published in Automatic control and computer sciences (01.12.2019)
    “…In 1978, Robert McEliece constructed the first asymmetric code-based cryptosystem using noise-immune Goppa codes; no effective key attacks has been described…”
    Get full text
    Journal Article
  7. 7

    Full Non-Binary Constant-Weight Codes by Kuznetsov, Alexandr, Kryvinska, Natalia, Kiian, Anastasiia, Smirnov, Oleksii, Kuznetsova, Kateryna

    ISSN: 2662-995X, 2661-8907
    Published: Singapore Springer Singapore 01.07.2021
    Published in SN computer science (01.07.2021)
    “…This paper presents the research results of mixed base number systems using binomial representation of numbers. It also shows the investigated non-linear…”
    Get full text
    Journal Article
  8. 8

    Complexity of statistical attacks on QC-LDPC code-based cryptosystems by Santini, Paolo, Baldi, Marco, Chiaraluce, Franco

    ISSN: 1751-8709, 1751-8717
    Published: The Institution of Engineering and Technology 01.05.2020
    Published in IET information security (01.05.2020)
    “…Public-key cryptosystems built on quasi-cyclic (QC) low-density parity-check and moderate-density parity-check codes are promising candidates for post-quantum…”
    Get full text
    Journal Article
  9. 9

    Scaling efficient code-based cryptosystems for embedded platforms by Biasi, Felipe P., Barreto, Paulo S. L. M., Misoczki, Rafael, Ruggiero, Wilson V.

    ISSN: 2190-8508, 2190-8516
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2014
    Published in Journal of cryptographic engineering (01.06.2014)
    “…We describe a family of efficient codes for cryptographic purposes and dedicated algorithms for their manipulation. Our proposal is especially tailored for…”
    Get full text
    Journal Article
  10. 10

    A Survey on Post Quantum Cryptosystems: Concept, Attacks, and Challenges in IoT Devices by Iqbal, Syed Shamikh, Zafar, Aasim

    Published: Bharati Vidyapeeth, New Delhi 15.03.2023
    “…Since the earliest times, cryptography has been used to safeguard the privacy of data or information during transmission and reception. Cryptographic studies…”
    Get full text
    Conference Proceeding
  11. 11

    On the Question of the Resistance of Code-Based Cryptosystems to Matrix Density Reduction Attacks by Veselova, V. A., Ovchinnikov, A. A., Veresova, A. M.

    Published: IEEE 31.05.2021
    “…Methods for reducing the density of matrices are discussed. These methods can be used to analyze the cryptocomplexity of systems based on error-correcting…”
    Get full text
    Conference Proceeding
  12. 12

    A High Efficiency Hardware Design for the Post-Quantum KEM HQC by Antognazza, Francesco, Barenghi, Alessandro, Pelosi, Gerardo, Susella, Ruggero

    ISSN: 2765-8406
    Published: IEEE 06.05.2024
    “…In this work, we present the first high-performance yet compact RTL design of the HQC cryptographic algorithm, fully compatible with the last specification…”
    Get full text
    Conference Proceeding
  13. 13

    Towards Robust Biometric Authentication: Implementing Post-Quantum Cryptography via Code-Based Fuzzy Extractors by Kuznetsov, Oleksandr, Kuznetsova, Yelyzaveta, Frontoni, Emanuele, Gorbenko, Yuriy

    Published: IEEE 13.11.2023
    “…In the burgeoning era of quantum computing, the security of biometric authentication systems is thrust into a new paradigm, necessitating the exploration and…”
    Get full text
    Conference Proceeding
  14. 14

    Deep Learning Based Fuzzy Extractor for Generating Strong Keys from Biometric Face Images by Kuznetsov, Alexandr, Zakharov, Dmytro, Frontoni, Emanuele, Romeo, Luca, Rosati, Riccardo

    Published: IEEE 10.10.2022
    “…Biometric techniques have traditionally been used in various cybersecurity applications. For instance, some user authentication systems use biometric facial…”
    Get full text
    Conference Proceeding
  15. 15

    Future-Ready Security in the Cloud with Post-Quantum Encryption by Dey, Kunal, Chaudhary, Chetan, K A, Balaji

    Published: IEEE 19.12.2023
    “…Since the dawn of the web and its widespread usage, privacy of data has been a significant problem. Multiple systems have been suggested; however, data…”
    Get full text
    Conference Proceeding
  16. 16

    A Complete Quantum Circuit to Solve the Information Set Decoding Problem by Perriello, Simone, Barenghi, Alessandro, Pelosi, Gerardo

    Published: IEEE 01.01.2021
    “…Providing strong security margins against cryptanalytic attackers equipped with quantum computers is a major research direction fostered by the US National…”
    Get full text
    Conference Proceeding
  17. 17

    Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions by Barenghi, Alessandro, Fornaciari, William, Galimberti, Andrea, Pelosi, Gerardo, Zoni, Davide

    Published: IEEE 01.11.2019
    “…The confidentiality provided by widely employed asymmetric cryptosystems relying on the hardness of factoring large integers or computing discrete logarithms…”
    Get full text
    Conference Proceeding
  18. 18

    Trade-off between Performance and Security for Coding and Ring Learning With Errors-based Diffie-Hellman Cryptosystems by Tellez, Claudio, Pereira, Diogo, Borges, Fabio

    Published: IEEE 01.06.2019
    “…In this work, we provide a complexity analysis of the trade-off between performance and security for two post-quantum key exchange cryptosystems: a protocol…”
    Get full text
    Conference Proceeding
  19. 19

    An encryption scheme based on Random Split of St-Gen codes by Samardjiska, Simona, Gligoroski, Danilo

    ISSN: 2157-8117
    Published: IEEE 01.07.2016
    “…Staircase-Generator codes (St-Gen codes) have recently been introduced in the design of code-based public key schemes and in the design of steganographic…”
    Get full text
    Conference Proceeding Journal Article
  20. 20

    ADMM and Reproducing Sum-Product Decoding Algorithm Applied to QC-MDPC Code-Based McEliece Cryptosystems by Watanabe, Kohtaro, Ohtsuka, Motonari, Tsukie, Yuta

    ISSN: 0018-9448, 1557-9654
    Published: New York IEEE 01.03.2024
    Published in IEEE transactions on information theory (01.03.2024)
    “…QC-MDPC (quasi cyclic moderate density parity check) code-based McEliece cryptosystems are considered to be one of the candidates for post-quantum…”
    Get full text
    Journal Article