Zobrazeno 1 - 2
of 2
pro vyhledávání: '"Julia Chaulet"'
Publikováno v:
Post-Quantum Cryptography-PQCrypto 2016
Post-Quantum Cryptography-PQCrypto 2016, Feb 2016, Fukuoka, Japan. ⟨10.1007/978-3-319-29360-8_9⟩
Post-Quantum Cryptography
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Post-Quantum Cryptography
Post-Quantum Cryptography ISBN: 9783319293592
PQCrypto
Post-Quantum Cryptography-PQCrypto 2016, Feb 2016, Fukuoka, Japan. ⟨10.1007/978-3-319-29360-8_9⟩
Post-Quantum Cryptography
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Post-Quantum Cryptography
Post-Quantum Cryptography ISBN: 9783319293592
PQCrypto
International audience; Polar codes discovered by Arikan form a very powerful family of codes attaining many information theoretic limits in the fields of error correction and source coding. They have in particular much better decoding capabilities t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9fd91e82bbe41a88acc3aa7879722b4a
https://inria.hal.science/hal-01240856
https://inria.hal.science/hal-01240856
Autor:
Julia Chaulet, Nicolas Sendrier
Publikováno v:
2016 IEEE International Symposium on Information Theory (ISIT)
IEEE International Symposium on Information Theory, ISIT 2016
IEEE International Symposium on Information Theory, ISIT 2016, Jul 2016, Barcelone, Spain. pp.5, ⟨10.1109/ISIT.2016.7541522⟩
ISIT
IEEE International Symposium on Information Theory, ISIT 2016
IEEE International Symposium on Information Theory, ISIT 2016, Jul 2016, Barcelone, Spain. pp.5, ⟨10.1109/ISIT.2016.7541522⟩
ISIT
McEliece encryption scheme which enjoys relatively small key sizes as well as a security reduction to hard problems of coding theory. Furthermore, it remains secure against a quantum adversary and is very well suited to low cost implementations on em