Search Results - "random linear code encryption"

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Improved RLCE public key encryption scheme based on Polar codes by Zhe LI, Yiliang HAN, Yu LI

    ISSN: 2096-109X
    Published: POSTS&TELECOM PRESS Co., LTD 01.10.2020
    Published in 网络与信息安全学报 (01.10.2020)
    “…For PolarRLCE has no semantic security and be vulnerable to adaptively chosen ciphertext attacks.Based onrandom linear code encryptionscheme,the structure of…”
    Get full text
    Journal Article
  2. 2

    Improved RLCE public key encryption scheme based on Polar codes by LI Zhe, LI Yu, HAN Yiliang

    ISSN: 2096-109X
    Published: POSTS&TELECOM PRESS Co., LTD 01.10.2020
    Published in 网络与信息安全学报 (01.10.2020)
    “…For PolarRLCE has no semantic security and be vulnerable to adaptively chosen ciphertext attacks. Based onrandom linear code encryptionscheme, the structure of…”
    Get full text
    Journal Article
  3. 3

    基于Polar码改进的RLCE公钥加密方案 by 李喆, 韩益亮, 李鱼

    ISSN: 2096-109X
    Published: 武警工程大学密码工程学院,陕西西安710086%武警工程大学密码工程学院,陕西西安710086 2020
    Published in 网络与信息安全学报 (2020)
    “…(random linear code encryption)方案的基础上,利用RLCE方案的结构和Polar码的极化性质,将Polar码作为方案的底层编码,通过RLCEspad消息填充的方法,采用普通编码对密文进行编码,提出一种具有语义安全、可以达到IND-CCA2安全的改进的RLCE公钥加密方案.改进后的方案将公钥矩阵转为系统…”
    Get full text
    Journal Article
  4. 4

    Recovering short secret keys of RLCE in polynomial time by Couvreur, Alain, Lequesne, Matthieu, Tillich, Jean-Pierre

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 29.05.2018
    Published in arXiv.org (29.05.2018)
    “…We present a key recovery attack against Y. Wang's Random Linear Code Encryption (RLCE…”
    Get full text
    Paper