Suchergebnisse - "code based cryptosystems"
-
1
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism
ISSN: 1556-6013, 1556-6021Veröffentlicht: New York IEEE 01.01.2023Veröffentlicht in IEEE transactions on information forensics and security (01.01.2023)“… The evolution of quantum computers poses a serious threat to contemporary public-key encryption (PKE) schemes. To address this impending issue, the National …”
Volltext
Journal Article -
2
Deep learning-based biometric cryptographic key generation with post-quantum security
ISSN: 1573-7721, 1380-7501, 1573-7721Veröffentlicht: New York Springer US 01.06.2024Veröffentlicht in Multimedia tools and applications (01.06.2024)“… In contemporary digital security systems, the generation and management of cryptographic keys, such as passwords and pin codes, often rely on stochastic random …”
Volltext
Journal Article -
3
A Finite Regime Analysis of Information Set Decoding Algorithms
ISSN: 1999-4893, 1999-4893Veröffentlicht: Basel MDPI AG 01.10.2019Veröffentlicht in Algorithms (01.10.2019)“… Decoding of random linear block codes has been long exploited as a computationally hard problem on which it is possible to build secure asymmetric …”
Volltext
Journal Article -
4
PolarSig: An efficient digital signature based on polar codes
ISSN: 1751-8628, 1751-8636Veröffentlicht: The Institution of Engineering and Technology 27.10.2020Veröffentlicht in IET communications (27.10.2020)“… Code-based digital signatures suffer from two main drawbacks: large public key size and slow signature generation. Large public key size is inherent in almost …”
Volltext
Journal Article -
5
Security of generalised Reed–Solomon code-based cryptosystems
ISSN: 1751-8709, 1751-8717Veröffentlicht: The Institution of Engineering and Technology 01.07.2019Veröffentlicht in IET information security (01.07.2019)“… In this study, the authors elaborate on a recently proposed variant of the public-key McEliece and Niederreiter cryptosystems using generalised Reed–Solomon …”
Volltext
Journal Article -
6
Codes in a Dihedral Group Algebra
ISSN: 0146-4116, 1558-108XVeröffentlicht: Moscow Pleiades Publishing 01.12.2019Veröffentlicht in Automatic control and computer sciences (01.12.2019)“… In 1978, Robert McEliece constructed the first asymmetric code-based cryptosystem using noise-immune Goppa codes; no effective key attacks has been described …”
Volltext
Journal Article -
7
Full Non-Binary Constant-Weight Codes
ISSN: 2662-995X, 2661-8907Veröffentlicht: Singapore Springer Singapore 01.07.2021Veröffentlicht in SN computer science (01.07.2021)“… This paper presents the research results of mixed base number systems using binomial representation of numbers. It also shows the investigated non-linear …”
Volltext
Journal Article -
8
Complexity of statistical attacks on QC-LDPC code-based cryptosystems
ISSN: 1751-8709, 1751-8717Veröffentlicht: The Institution of Engineering and Technology 01.05.2020Veröffentlicht in IET information security (01.05.2020)“… Public-key cryptosystems built on quasi-cyclic (QC) low-density parity-check and moderate-density parity-check codes are promising candidates for post-quantum …”
Volltext
Journal Article -
9
Scaling efficient code-based cryptosystems for embedded platforms
ISSN: 2190-8508, 2190-8516Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2014Veröffentlicht in Journal of cryptographic engineering (01.06.2014)“… We describe a family of efficient codes for cryptographic purposes and dedicated algorithms for their manipulation. Our proposal is especially tailored for …”
Volltext
Journal Article -
10
A Survey on Post Quantum Cryptosystems: Concept, Attacks, and Challenges in IoT Devices
Veröffentlicht: Bharati Vidyapeeth, New Delhi 15.03.2023Veröffentlicht in 2023 10th International Conference on Computing for Sustainable Global Development (INDIACom) (15.03.2023)“… Since the earliest times, cryptography has been used to safeguard the privacy of data or information during transmission and reception. Cryptographic studies …”
Volltext
Tagungsbericht -
11
On the Question of the Resistance of Code-Based Cryptosystems to Matrix Density Reduction Attacks
Veröffentlicht: IEEE 31.05.2021Veröffentlicht in 2021 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF) (31.05.2021)“… Methods for reducing the density of matrices are discussed. These methods can be used to analyze the cryptocomplexity of systems based on error-correcting …”
Volltext
Tagungsbericht -
12
A High Efficiency Hardware Design for the Post-Quantum KEM HQC
ISSN: 2765-8406Veröffentlicht: IEEE 06.05.2024Veröffentlicht in Proceedings of the ... IEEE International Symposium on Hardware-Oriented Security and Trust (Online) (06.05.2024)“… In this work, we present the first high-performance yet compact RTL design of the HQC cryptographic algorithm, fully compatible with the last specification …”
Volltext
Tagungsbericht -
13
Towards Robust Biometric Authentication: Implementing Post-Quantum Cryptography via Code-Based Fuzzy Extractors
Veröffentlicht: IEEE 13.11.2023Veröffentlicht in 2023 IEEE International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo) (13.11.2023)“… In the burgeoning era of quantum computing, the security of biometric authentication systems is thrust into a new paradigm, necessitating the exploration and …”
Volltext
Tagungsbericht -
14
Deep Learning Based Fuzzy Extractor for Generating Strong Keys from Biometric Face Images
Veröffentlicht: IEEE 10.10.2022Veröffentlicht in 2022 IEEE 9th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T) (10.10.2022)“… Biometric techniques have traditionally been used in various cybersecurity applications. For instance, some user authentication systems use biometric facial …”
Volltext
Tagungsbericht -
15
Future-Ready Security in the Cloud with Post-Quantum Encryption
Veröffentlicht: IEEE 19.12.2023Veröffentlicht in 2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC) (19.12.2023)“… Since the dawn of the web and its widespread usage, privacy of data has been a significant problem. Multiple systems have been suggested; however, data …”
Volltext
Tagungsbericht -
16
A Complete Quantum Circuit to Solve the Information Set Decoding Problem
Veröffentlicht: IEEE 01.01.2021Veröffentlicht in 2021 IEEE International Conference on Quantum Computing and Engineering (QCE) (01.01.2021)“… Providing strong security margins against cryptanalytic attackers equipped with quantum computers is a major research direction fostered by the US National …”
Volltext
Tagungsbericht -
17
Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions
Veröffentlicht: IEEE 01.11.2019Veröffentlicht in 2019 26th IEEE International Conference on Electronics, Circuits and Systems (ICECS) (01.11.2019)“… The confidentiality provided by widely employed asymmetric cryptosystems relying on the hardness of factoring large integers or computing discrete logarithms …”
Volltext
Tagungsbericht -
18
Trade-off between Performance and Security for Coding and Ring Learning With Errors-based Diffie-Hellman Cryptosystems
Veröffentlicht: IEEE 01.06.2019Veröffentlicht in 2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT) (01.06.2019)“… In this work, we provide a complexity analysis of the trade-off between performance and security for two post-quantum key exchange cryptosystems: a protocol …”
Volltext
Tagungsbericht -
19
An encryption scheme based on Random Split of St-Gen codes
ISSN: 2157-8117Veröffentlicht: IEEE 01.07.2016Veröffentlicht in Proceedings / IEEE International Symposium on Information Theory (01.07.2016)“… Staircase-Generator codes (St-Gen codes) have recently been introduced in the design of code-based public key schemes and in the design of steganographic …”
Volltext
Tagungsbericht Journal Article -
20
ADMM and Reproducing Sum-Product Decoding Algorithm Applied to QC-MDPC Code-Based McEliece Cryptosystems
ISSN: 0018-9448, 1557-9654Veröffentlicht: New York IEEE 01.03.2024Veröffentlicht in IEEE transactions on information theory (01.03.2024)“… QC-MDPC (quasi cyclic moderate density parity check) code-based McEliece cryptosystems are considered to be one of the candidates for post-quantum …”
Volltext
Journal Article