Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Klamti, Jean Belo"'
Publikováno v:
Journal of Mathematical Cryptology, Vol 18, Iss 1, Pp p. 152-82 (2024)
A chameleon hash function is a type of hash function that involves a trapdoor to help find collisions, i.e., it allows the rewriting of a message without modifying the hash. For some applications, it is important to have the feature of revoking the r
Externí odkaz:
https://doaj.org/article/5605e8565d88451b9b5f5fa15e9ab2a4
Autor:
Klamti, Jean Belo, Hasan, M. Anwar
A key encapsulation mechanism (KEM) that takes as input an arbitrary string, i.e., a tag, is known as tag-KEM, while a scheme that combines signature and encryption is called signcryption. In this paper, we present a code-based signcryption tag-KEM s
Externí odkaz:
http://arxiv.org/abs/2112.07130
Autor:
Klamti Jean Belo, Hasan M. Anwarul
Publikováno v:
Journal of Mathematical Cryptology, Vol 17, Iss 1, Pp 165-79 (2023)
A key encapsulation mechanism (KEM{\mathsf{KEM}}) that takes as input an arbitrary string, i.e., a tag, is known as tag-KEM{\mathsf{KEM}}, while a scheme that combines signature and encryption is called signcryption. In this article, we present a cod
Externí odkaz:
https://doaj.org/article/a889449c8b9b4d2e97be7df23aa65415
Most of the codes that have an algebraic decoding algorithm are derived from the Reed Solomon codes. They are obtained by taking equivalent codes, for example the generalized Reed Solomon codes, or by using the so-called subfield subcode method, whic
Externí odkaz:
http://arxiv.org/abs/1704.07882
Autor:
Banegas Gustavo, Barreto Paulo S. L. M., Boidje Brice Odilon, Cayrel Pierre-Louis, Dione Gilbert Ndollane, Gaj Kris, Gueye Cheikh Thiécoumba, Haeussler Richard, Klamti Jean Belo, N’diaye Ousmane, Nguyen Duc Tri, Persichetti Edoardo, Ricardini Jefferson E.
Publikováno v:
Journal of Mathematical Cryptology, Vol 12, Iss 4, Pp 221-239 (2018)
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes. The sc
Externí odkaz:
https://doaj.org/article/37acaf8dbf434c0d91452eef2d342393
Autor:
Banegas, Gustavo, Barreto, Paulo S.L.M., Boidje, Brice Odilon, Cayrel, Pierre-Louis, Dione, Gilbert Ndollane, Gaj, Kris, Gueye, Cheikh Thiécoumba, Haeussler, Richard, Klamti, Jean Belo, Ndiaye, Ousmane, Nguyen, Duc Tri, Persichetti, Edoardo, Ricardini, Jefferson E., Baldi, Marco, Santini, Paolo
Publikováno v:
Code-Based Cryptography-7th International Workshop, CBC 2019, Revised Selected Papers, 69-85
STARTPAGE=69;ENDPAGE=85;TITLE=Code-Based Cryptography-7th International Workshop, CBC 2019, Revised Selected Papers
Code-Based Cryptography ISBN: 9783030259211
CBC
STARTPAGE=69;ENDPAGE=85;TITLE=Code-Based Cryptography-7th International Workshop, CBC 2019, Revised Selected Papers
Code-Based Cryptography ISBN: 9783030259211
CBC
In this paper we revisit some of the main aspects of the DAGS Key Encapsulation Mechanism, one of the code-based candidates to NIST’s standardization call for the key exchange/encryption functionalities. In particular, we modify the algorithms for
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2518adf1ba7904697c353dd298f517a5
https://research.tue.nl/en/publications/eed62e1b-f15b-466f-ae89-325f23619329
https://research.tue.nl/en/publications/eed62e1b-f15b-466f-ae89-325f23619329
Autor:
Banegas, Gustavo, Barreto, Paulo S. L. M., Boidje, Brice Odilon, Cayrel, Pierre-Louis, Dione, Gilbert Ndollane, Gaj, Kris, Gueye, Cheikh Thi´ecoumba, Haeussler, Richard, Klamti, Jean Belo, N'diaye, Ousmane, Nguyen, Duc Tri, Persichetti, Edoardo, Ricardini, Jefferson E.
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes. The sc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2659::11c945af77c9abc21fa96719882c0f88
https://zenodo.org/record/2594495
https://zenodo.org/record/2594495
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Mathematics (2227-7390); Feb2023, Vol. 11 Issue 3, p643, 76p
This volume contains the papers accepted for presentation at Africacrypt 2023, the 14th International Conference on the Theory and Application of Cryptographic Techniques in Africa. The 21 full papers included in this book were carefully reviewed