Suchergebnisse - "code based cryptosystems"

  1. 1

    Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism von Nosouhi, Mohammad Reza, Shah, Syed W., Pan, Lei, Zolotavkin, Yevhen, Nanda, Ashish, Gauravaram, Praveen, Doss, Robin

    ISSN: 1556-6013, 1556-6021
    Veröffentlicht: New York IEEE 01.01.2023
    “… The evolution of quantum computers poses a serious threat to contemporary public-key encryption (PKE) schemes. To address this impending issue, the National …”
    Volltext
    Journal Article
  2. 2

    Deep learning-based biometric cryptographic key generation with post-quantum security von Kuznetsov, Oleksandr, Zakharov, Dmytro, Frontoni, Emanuele

    ISSN: 1573-7721, 1380-7501, 1573-7721
    Veröffentlicht: New York Springer US 01.06.2024
    Veröffentlicht in Multimedia tools and applications (01.06.2024)
    “… In contemporary digital security systems, the generation and management of cryptographic keys, such as passwords and pin codes, often rely on stochastic random …”
    Volltext
    Journal Article
  3. 3

    A Finite Regime Analysis of Information Set Decoding Algorithms von Baldi, Marco, Barenghi, Alessandro, Chiaraluce, Franco, Pelosi, Gerardo, Santini, Paolo

    ISSN: 1999-4893, 1999-4893
    Veröffentlicht: Basel MDPI AG 01.10.2019
    Veröffentlicht in Algorithms (01.10.2019)
    “… Decoding of random linear block codes has been long exploited as a computationally hard problem on which it is possible to build secure asymmetric …”
    Volltext
    Journal Article
  4. 4

    PolarSig: An efficient digital signature based on polar codes von Forghani, Pouyan, Koochak Shooshtari, Masoumeh, Aref, Mohammad Reza

    ISSN: 1751-8628, 1751-8636
    Veröffentlicht: The Institution of Engineering and Technology 27.10.2020
    Veröffentlicht in IET communications (27.10.2020)
    “… Code-based digital signatures suffer from two main drawbacks: large public key size and slow signature generation. Large public key size is inherent in almost …”
    Volltext
    Journal Article
  5. 5

    Security of generalised Reed–Solomon code-based cryptosystems von Baldi, Marco, Chiaraluce, Franco, Rosenthal, Joachim, Santini, Paolo, Schipani, Davide

    ISSN: 1751-8709, 1751-8717
    Veröffentlicht: The Institution of Engineering and Technology 01.07.2019
    Veröffentlicht in IET information security (01.07.2019)
    “… In this study, the authors elaborate on a recently proposed variant of the public-key McEliece and Niederreiter cryptosystems using generalised Reed–Solomon …”
    Volltext
    Journal Article
  6. 6

    Codes in a Dihedral Group Algebra von Vedenev, K. V., Deundyak, V. M.

    ISSN: 0146-4116, 1558-108X
    Veröffentlicht: Moscow Pleiades Publishing 01.12.2019
    Veröffentlicht in Automatic control and computer sciences (01.12.2019)
    “… In 1978, Robert McEliece constructed the first asymmetric code-based cryptosystem using noise-immune Goppa codes; no effective key attacks has been described …”
    Volltext
    Journal Article
  7. 7

    Full Non-Binary Constant-Weight Codes von Kuznetsov, Alexandr, Kryvinska, Natalia, Kiian, Anastasiia, Smirnov, Oleksii, Kuznetsova, Kateryna

    ISSN: 2662-995X, 2661-8907
    Veröffentlicht: Singapore Springer Singapore 01.07.2021
    Veröffentlicht in SN computer science (01.07.2021)
    “… This paper presents the research results of mixed base number systems using binomial representation of numbers. It also shows the investigated non-linear …”
    Volltext
    Journal Article
  8. 8

    Complexity of statistical attacks on QC-LDPC code-based cryptosystems von Santini, Paolo, Baldi, Marco, Chiaraluce, Franco

    ISSN: 1751-8709, 1751-8717
    Veröffentlicht: The Institution of Engineering and Technology 01.05.2020
    Veröffentlicht in IET information security (01.05.2020)
    “… Public-key cryptosystems built on quasi-cyclic (QC) low-density parity-check and moderate-density parity-check codes are promising candidates for post-quantum …”
    Volltext
    Journal Article
  9. 9

    Scaling efficient code-based cryptosystems for embedded platforms von Biasi, Felipe P., Barreto, Paulo S. L. M., Misoczki, Rafael, Ruggiero, Wilson V.

    ISSN: 2190-8508, 2190-8516
    Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2014
    Veröffentlicht in Journal of cryptographic engineering (01.06.2014)
    “… We describe a family of efficient codes for cryptographic purposes and dedicated algorithms for their manipulation. Our proposal is especially tailored for …”
    Volltext
    Journal Article
  10. 10

    A Survey on Post Quantum Cryptosystems: Concept, Attacks, and Challenges in IoT Devices von Iqbal, Syed Shamikh, Zafar, Aasim

    Veröffentlicht: Bharati Vidyapeeth, New Delhi 15.03.2023
    “… Since the earliest times, cryptography has been used to safeguard the privacy of data or information during transmission and reception. Cryptographic studies …”
    Volltext
    Tagungsbericht
  11. 11

    On the Question of the Resistance of Code-Based Cryptosystems to Matrix Density Reduction Attacks von Veselova, V. A., Ovchinnikov, A. A., Veresova, A. M.

    Veröffentlicht: IEEE 31.05.2021
    “… Methods for reducing the density of matrices are discussed. These methods can be used to analyze the cryptocomplexity of systems based on error-correcting …”
    Volltext
    Tagungsbericht
  12. 12

    A High Efficiency Hardware Design for the Post-Quantum KEM HQC von Antognazza, Francesco, Barenghi, Alessandro, Pelosi, Gerardo, Susella, Ruggero

    ISSN: 2765-8406
    Veröffentlicht: IEEE 06.05.2024
    “… In this work, we present the first high-performance yet compact RTL design of the HQC cryptographic algorithm, fully compatible with the last specification …”
    Volltext
    Tagungsbericht
  13. 13

    Towards Robust Biometric Authentication: Implementing Post-Quantum Cryptography via Code-Based Fuzzy Extractors von Kuznetsov, Oleksandr, Kuznetsova, Yelyzaveta, Frontoni, Emanuele, Gorbenko, Yuriy

    Veröffentlicht: IEEE 13.11.2023
    “… In the burgeoning era of quantum computing, the security of biometric authentication systems is thrust into a new paradigm, necessitating the exploration and …”
    Volltext
    Tagungsbericht
  14. 14

    Deep Learning Based Fuzzy Extractor for Generating Strong Keys from Biometric Face Images von Kuznetsov, Alexandr, Zakharov, Dmytro, Frontoni, Emanuele, Romeo, Luca, Rosati, Riccardo

    Veröffentlicht: IEEE 10.10.2022
    “… Biometric techniques have traditionally been used in various cybersecurity applications. For instance, some user authentication systems use biometric facial …”
    Volltext
    Tagungsbericht
  15. 15

    Future-Ready Security in the Cloud with Post-Quantum Encryption von Dey, Kunal, Chaudhary, Chetan, K A, Balaji

    Veröffentlicht: IEEE 19.12.2023
    “… Since the dawn of the web and its widespread usage, privacy of data has been a significant problem. Multiple systems have been suggested; however, data …”
    Volltext
    Tagungsbericht
  16. 16

    A Complete Quantum Circuit to Solve the Information Set Decoding Problem von Perriello, Simone, Barenghi, Alessandro, Pelosi, Gerardo

    Veröffentlicht: IEEE 01.01.2021
    “… Providing strong security margins against cryptanalytic attackers equipped with quantum computers is a major research direction fostered by the US National …”
    Volltext
    Tagungsbericht
  17. 17

    Evaluating the Trade-offs in the Hardware Design of the LEDAcrypt Encryption Functions von Barenghi, Alessandro, Fornaciari, William, Galimberti, Andrea, Pelosi, Gerardo, Zoni, Davide

    Veröffentlicht: IEEE 01.11.2019
    “… The confidentiality provided by widely employed asymmetric cryptosystems relying on the hardness of factoring large integers or computing discrete logarithms …”
    Volltext
    Tagungsbericht
  18. 18

    Trade-off between Performance and Security for Coding and Ring Learning With Errors-based Diffie-Hellman Cryptosystems von Tellez, Claudio, Pereira, Diogo, Borges, Fabio

    Veröffentlicht: IEEE 01.06.2019
    “… In this work, we provide a complexity analysis of the trade-off between performance and security for two post-quantum key exchange cryptosystems: a protocol …”
    Volltext
    Tagungsbericht
  19. 19

    An encryption scheme based on Random Split of St-Gen codes von Samardjiska, Simona, Gligoroski, Danilo

    ISSN: 2157-8117
    Veröffentlicht: IEEE 01.07.2016
    “… Staircase-Generator codes (St-Gen codes) have recently been introduced in the design of code-based public key schemes and in the design of steganographic …”
    Volltext
    Tagungsbericht Journal Article
  20. 20

    ADMM and Reproducing Sum-Product Decoding Algorithm Applied to QC-MDPC Code-Based McEliece Cryptosystems von Watanabe, Kohtaro, Ohtsuka, Motonari, Tsukie, Yuta

    ISSN: 0018-9448, 1557-9654
    Veröffentlicht: New York IEEE 01.03.2024
    Veröffentlicht in IEEE transactions on information theory (01.03.2024)
    “… QC-MDPC (quasi cyclic moderate density parity check) code-based McEliece cryptosystems are considered to be one of the candidates for post-quantum …”
    Volltext
    Journal Article