Search Results - "Code-based cryptosystems"
-
1
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism
ISSN: 1556-6013, 1556-6021Published: New York IEEE 01.01.2023Published in IEEE transactions on information forensics and security (01.01.2023)“…The evolution of quantum computers poses a serious threat to contemporary public-key encryption (PKE) schemes. To address this impending issue, the National…”
Get full text
Journal Article -
2
Deep learning-based biometric cryptographic key generation with post-quantum security
ISSN: 1573-7721, 1380-7501, 1573-7721Published: New York Springer US 01.06.2024Published in Multimedia tools and applications (01.06.2024)“…In contemporary digital security systems, the generation and management of cryptographic keys, such as passwords and pin codes, often rely on stochastic random…”
Get full text
Journal Article -
3
A Finite Regime Analysis of Information Set Decoding Algorithms
ISSN: 1999-4893, 1999-4893Published: Basel MDPI AG 01.10.2019Published in Algorithms (01.10.2019)“…Decoding of random linear block codes has been long exploited as a computationally hard problem on which it is possible to build secure asymmetric…”
Get full text
Journal Article -
4
PolarSig: An efficient digital signature based on polar codes
ISSN: 1751-8628, 1751-8636Published: The Institution of Engineering and Technology 27.10.2020Published in IET communications (27.10.2020)“…Code-based digital signatures suffer from two main drawbacks: large public key size and slow signature generation. Large public key size is inherent in almost…”
Get full text
Journal Article -
5
Security of generalised Reed–Solomon code-based cryptosystems
ISSN: 1751-8709, 1751-8717Published: The Institution of Engineering and Technology 01.07.2019Published in IET information security (01.07.2019)“…In this study, the authors elaborate on a recently proposed variant of the public-key McEliece and Niederreiter cryptosystems using generalised Reed–Solomon…”
Get full text
Journal Article -
6
Codes in a Dihedral Group Algebra
ISSN: 0146-4116, 1558-108XPublished: Moscow Pleiades Publishing 01.12.2019Published in Automatic control and computer sciences (01.12.2019)“…In 1978, Robert McEliece constructed the first asymmetric code-based cryptosystem using noise-immune Goppa codes; no effective key attacks has been described…”
Get full text
Journal Article -
7
Full Non-Binary Constant-Weight Codes
ISSN: 2662-995X, 2661-8907Published: Singapore Springer Singapore 01.07.2021Published in SN computer science (01.07.2021)“…This paper presents the research results of mixed base number systems using binomial representation of numbers. It also shows the investigated non-linear…”
Get full text
Journal Article -
8
Complexity of statistical attacks on QC-LDPC code-based cryptosystems
ISSN: 1751-8709, 1751-8717Published: The Institution of Engineering and Technology 01.05.2020Published in IET information security (01.05.2020)“…Public-key cryptosystems built on quasi-cyclic (QC) low-density parity-check and moderate-density parity-check codes are promising candidates for post-quantum…”
Get full text
Journal Article -
9
Scaling efficient code-based cryptosystems for embedded platforms
ISSN: 2190-8508, 2190-8516Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2014Published in Journal of cryptographic engineering (01.06.2014)“…We describe a family of efficient codes for cryptographic purposes and dedicated algorithms for their manipulation. Our proposal is especially tailored for…”
Get full text
Journal Article -
10
A Survey on Post Quantum Cryptosystems: Concept, Attacks, and Challenges in IoT Devices
Published: Bharati Vidyapeeth, New Delhi 15.03.2023Published in 2023 10th International Conference on Computing for Sustainable Global Development (INDIACom) (15.03.2023)“…Since the earliest times, cryptography has been used to safeguard the privacy of data or information during transmission and reception. Cryptographic studies…”
Get full text
Conference Proceeding -
11
On the Question of the Resistance of Code-Based Cryptosystems to Matrix Density Reduction Attacks
Published: IEEE 31.05.2021Published in 2021 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF) (31.05.2021)“…Methods for reducing the density of matrices are discussed. These methods can be used to analyze the cryptocomplexity of systems based on error-correcting…”
Get full text
Conference Proceeding -
12
A High Efficiency Hardware Design for the Post-Quantum KEM HQC
ISSN: 2765-8406Published: IEEE 06.05.2024Published in Proceedings of the ... IEEE International Symposium on Hardware-Oriented Security and Trust (Online) (06.05.2024)“…In this work, we present the first high-performance yet compact RTL design of the HQC cryptographic algorithm, fully compatible with the last specification…”
Get full text
Conference Proceeding -
13
Towards Robust Biometric Authentication: Implementing Post-Quantum Cryptography via Code-Based Fuzzy Extractors
Published: IEEE 13.11.2023Published in 2023 IEEE International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo) (13.11.2023)“…In the burgeoning era of quantum computing, the security of biometric authentication systems is thrust into a new paradigm, necessitating the exploration and…”
Get full text
Conference Proceeding -
14
Deep Learning Based Fuzzy Extractor for Generating Strong Keys from Biometric Face Images
Published: IEEE 10.10.2022Published in 2022 IEEE 9th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T) (10.10.2022)“…Biometric techniques have traditionally been used in various cybersecurity applications. For instance, some user authentication systems use biometric facial…”
Get full text
Conference Proceeding -
15
Future-Ready Security in the Cloud with Post-Quantum Encryption
Published: IEEE 19.12.2023Published in 2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC) (19.12.2023)“…Since the dawn of the web and its widespread usage, privacy of data has been a significant problem. Multiple systems have been suggested; however, data…”
Get full text
Conference Proceeding -
16
A Complete Quantum Circuit to Solve the Information Set Decoding Problem
Published: IEEE 01.01.2021Published in 2021 IEEE International Conference on Quantum Computing and Engineering (QCE) (01.01.2021)“…Providing strong security margins against cryptanalytic attackers equipped with quantum computers is a major research direction fostered by the US National…”
Get full text
Conference Proceeding -
17
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions
Published: IEEE 01.11.2019Published in 2019 26th IEEE International Conference on Electronics, Circuits and Systems (ICECS) (01.11.2019)“…The confidentiality provided by widely employed asymmetric cryptosystems relying on the hardness of factoring large integers or computing discrete logarithms…”
Get full text
Conference Proceeding -
18
Trade-off between Performance and Security for Coding and Ring Learning With Errors-based Diffie-Hellman Cryptosystems
Published: IEEE 01.06.2019Published in 2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT) (01.06.2019)“…In this work, we provide a complexity analysis of the trade-off between performance and security for two post-quantum key exchange cryptosystems: a protocol…”
Get full text
Conference Proceeding -
19
An encryption scheme based on Random Split of St-Gen codes
ISSN: 2157-8117Published: IEEE 01.07.2016Published in Proceedings / IEEE International Symposium on Information Theory (01.07.2016)“…Staircase-Generator codes (St-Gen codes) have recently been introduced in the design of code-based public key schemes and in the design of steganographic…”
Get full text
Conference Proceeding Journal Article -
20
ADMM and Reproducing Sum-Product Decoding Algorithm Applied to QC-MDPC Code-Based McEliece Cryptosystems
ISSN: 0018-9448, 1557-9654Published: New York IEEE 01.03.2024Published in IEEE transactions on information theory (01.03.2024)“…QC-MDPC (quasi cyclic moderate density parity check) code-based McEliece cryptosystems are considered to be one of the candidates for post-quantum…”
Get full text
Journal Article