Search Results - Code Based Cryptography
-
1
Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions
ISSN: 2410-387X, 2410-387XPublished: Basel MDPI AG 01.12.2021Published in Cryptography (01.12.2021)“… Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems, based on modular arithmetic to the contemporary cryptosystems based on quantum computing…”
Get full text
Journal Article -
2
Lossy Cryptography from Code-Based Assumptions Dense-Sparse LPN: A New Subexponentially Hard LPN Variant in SZK: Lossy Cryptography from Code-Based Assumptions Dense-Sparse
ISSN: 0933-2790, 1432-1378Published: New York Springer US 11.09.2025Published in Journal of cryptology (11.09.2025)“… . This poses a barrier for building advanced cryptography from code-based assumptions such as Learning Parity with Noise (LPN…”
Get full text
Journal Article -
3
Optimized implementation of QC‐MDPC code‐based cryptography
ISSN: 1532-0626, 1532-0634Published: Hoboken Wiley Subscription Services, Inc 25.09.2019Published in Concurrency and computation (25.09.2019)“… constant‐time implementation of the Niederreiter cryptosystem using QC‐MDPC codes. In this version, we updated the implementation parameters to meet the 128…”
Get full text
Journal Article -
4
Error Amplification in Code-based Cryptography
ISSN: 2569-2925, 2569-2925Published: 09.11.2018Published in IACR transactions on cryptographic hardware and embedded systems (09.11.2018)“…Code-based cryptography is one of the main techniques enabling cryptographic primitives in a post-quantum scenario…”
Get full text
Journal Article -
5
Code-Based Cryptography with Generalized Concatenated Codes for Restricted Error Values
ISSN: 2644-125X, 2644-125XPublished: New York IEEE 2022Published in IEEE open journal of the Communications Society (2022)“…Code-based cryptosystems are promising candidates for post-quantum cryptography. Recently, generalized concatenated codes over Gaussian and Eisenstein integers were proposed for those systems…”
Get full text
Journal Article -
6
Probabilistic root finding in code-based cryptography
ISSN: 2190-8508, 2190-8516Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.04.2024Published in Journal of cryptographic engineering (01.04.2024)“…Probabilistic algorithms for finding roots of polynomials have not been applied to code-based cryptography…”
Get full text
Journal Article -
7
Improved Frobenius FFT for Code-Based Cryptography on Cortex-M4
ISSN: 2327-4662, 2327-4662Published: Piscataway IEEE 01.09.2025Published in IEEE internet of things journal (01.09.2025)“…Polynomial multiplication over finite fields is one of the most significant operations in code-based cryptography, including hamming quasi-cyclic (HQC…”
Get full text
Journal Article -
8
Lightweight Post-Quantum Secure Communication Protocol for IoT Devices Using Code-Based Cryptography
ISSN: 0098-3063, 1558-4127Published: New York IEEE 2025Published in IEEE transactions on consumer electronics (2025)“… Currently, most cryptographic techniques used in security protocols are based on RSA and ECC…”
Get full text
Journal Article -
9
Construction of quasi-cyclic alternant codes and their application in code-based cryptography
ISSN: 2071-0410, 2311-2263Published: 2024Published in Prikladnaya Diskretnaya Matematika (2024)“… applications and, as in theory, in reducing the key length of post-quantum code-based schemes…”
Get full text
Journal Article -
10
Optimizing Code-Based Cryptography for Efficient and Secure Post-Quantum Key Agreement
ISSN: 1877-0509, 1877-0509Published: Elsevier B.V 2025Published in Procedia computer science (2025)“… This paper proposes a lightweight key agreement protocol utilizing code-based cryptography optimized for such environments…”
Get full text
Journal Article -
11
Generalized Concatenated Codes over Gaussian and Eisenstein Integers for Code-Based Cryptography
ISSN: 2410-387X, 2410-387XPublished: Basel MDPI AG 01.12.2021Published in Cryptography (01.12.2021)“…The code-based McEliece and Niederreiter cryptosystems are promising candidates for post-quantum public-key encryption…”
Get full text
Journal Article -
12
Next-Gen IoT Security using Polar Codes-based Cryptography for malware defence through quantum self-attention neural network
ISSN: 0950-7051Published: Elsevier B.V 28.06.2025Published in Knowledge-based systems (28.06.2025)“…•Polar Codes-based Cryptography (PCBC) is applied with key optimization using Multi-Objective Fitness Dependent Optimizer Algorithm (MOFDOA…”
Get full text
Journal Article -
13
An exploratory analysis of the evolution and trends of code-based cryptography
ISSN: 0972-0529, 2169-0065Published: 01.04.2025Published in Journal of discrete mathematical sciences & cryptography (01.04.2025)“…Code-based cryptography has emerged as a promising paradigm in cryptographic research, offering robust security foundations against quantum computing threats…”
Get full text
Journal Article -
14
Hybrid cryptosystem in wireless body area networks using message authentication code and modified and enhanced lattice‐based cryptography (MAC‐MELBC) in healthcare applications
ISSN: 1532-0626, 1532-0634Published: Hoboken, USA John Wiley & Sons, Inc 10.05.2021Published in Concurrency and computation (10.05.2021)“… In healthcare, it improves the patient's life quality based on a faster, accurate diagnosis of diseases and better treatment of patients…”
Get full text
Journal Article -
15
Compact Constant Weight Coding Engines for the Code-Based Cryptography
ISSN: 1549-7747, 1558-3791Published: IEEE 01.09.2017Published in IEEE transactions on circuits and systems. II, Express briefs (01.09.2017)“… For the time being, the design presented in this brief is the most compact one for any code-based encryption schemes…”
Get full text
Journal Article -
16
TYRCA: A RISC-V Tightly-Coupled Accelerator for Code-Based Cryptography
ISSN: 1558-1101Published: EDAA 31.03.2025Published in Proceedings - Design, Automation, and Test in Europe Conference and Exhibition (31.03.2025)“…Post-quantum cryptography (PQC) has garnered significant attention across various communities, particularly with the National Institute of Standards and Technology (NIST…”
Get full text
Conference Proceeding -
17
A new code‐based designated verifier signature scheme
ISSN: 1074-5351, 1099-1131Published: Chichester Wiley Subscription Services, Inc 25.11.2018Published in International journal of communication systems (25.11.2018)“… Most of the existing DVS schemes are based on the hard problems in number theory such as integer factorization or the discrete log problem…”
Get full text
Journal Article -
18
Secure and Efficient Code-Based Cryptography for Multi-Party Computation and Digital Signatures
ISSN: 2813-0324Published: MDPI AG 01.05.2023Published in Computer sciences & mathematics forum (01.05.2023)“…Code-based cryptography is a promising candidate for post-quantum cryptography due to its strong security guarantees and efficient implementations…”
Get full text
Journal Article -
19
Lossy Cryptography from Code-Based Assumptions Dense-Sparse LPN: A New Subexponentially Hard LPN Variant in SZK
ISSN: 0933-2790, 1432-1378Published: New York Springer Nature B.V 01.10.2025Published in Journal of cryptology (01.10.2025)“… . This poses a barrier for building advanced cryptography from code-based assumptions such as Learning Parity with Noise (LPN…”
Get full text
Journal Article -
20
Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography
ISSN: 2569-2925Published: Ruhr-Universität Bochum 01.08.2019Published in IACR transactions on cryptographic hardware and embedded systems (01.08.2019)“…) code-based cryptography to mitigate timing attacks at CHES 2016. This countermeasure was later found to become vulnerable to a differential power analysis (DPA…”
Get full text
Journal Article