Zobrazeno 1 - 10
of 333
pro vyhledávání: '"Santini Paolo"'
Publikováno v:
Journal of Mathematical Cryptology, Vol 16, Iss 1, Pp 20-48 (2021)
Structured linear block codes such as cyclic, quasi-cyclic and quasi-dyadic codes have gained an increasing role in recent years both in the context of error control and in that of code-based cryptography. Some well known families of structured linea
Externí odkaz:
https://doaj.org/article/67452fa856484ee7b2bf62d1b5ac6360
Publikováno v:
Journal of Mathematical Cryptology, Vol 14, Iss 1, Pp 95-109 (2020)
Cryptographic primitives from coding theory are some of the most promising candidates for NIST’s Post-Quantum Cryptography Standardization process. In this paper, we introduce a variety of techniques to improve operations on dyadic matrices, a part
Externí odkaz:
https://doaj.org/article/500fba8fc29744f884cf71ffa4245688
Autor:
Chicco, Simone, Allodi, Giuseppe, Chiesa, Alessandro, Garlatti, Elena, Buch, Christian D., Santini, Paolo, De Renzi, Roberto, Piligkos, Stergios, Carretta, Stefano
The use of $d$-level qudits instead of two-level qubits can largely increase the power of quantum logic for many applications, ranging from quantum simulations to quantum error correction. Molecular Nanomagnets are ideal spin systems to realize these
Externí odkaz:
http://arxiv.org/abs/2309.05600
The Ablowitz-Ladik (AL) equations are distinguished integrable discretizations of the focusing and defocusing nonlinear Schr\"odinger (NLS) equations. In a previous paper (arXiv:2305.04857) we have studied the effect of the modulation instability of
Externí odkaz:
http://arxiv.org/abs/2305.07339
Autor:
Baldi, Marco, Bitzer, Sebastian, Pavoni, Alessio, Santini, Paolo, Wachter-Zeh, Antonia, Weger, Violetta
Several recently proposed code-based cryptosystems base their security on a slightly generalized version of the classical (syndrome) decoding problem. Namely, in the so-called restricted (syndrome) decoding problem, the error values stem from a restr
Externí odkaz:
http://arxiv.org/abs/2303.08882
The growing interest in Internet of Things (IoT) and Industrial IoT (IIoT) poses the challenge of finding robust solutions for the certification and notarization of data produced and collected by embedded devices. The blockchain and distributed ledge
Externí odkaz:
http://arxiv.org/abs/2206.14782
The Permuted Kernel Problem (PKP) asks to find a permutation of a given vector belonging to the kernel of a given matrix. The PKP is at the basis of PKP-DSS, a post-quantum signature scheme deriving from the identification scheme proposed by Shamir i
Externí odkaz:
http://arxiv.org/abs/2206.14547
The use of codes defined by sparse characteristic matrices, like QC-LDPC and QC-MDPC codes, has become an established solution to design secure and efficient code-based public-key encryption schemes, as also witnessed by the ongoing NIST post-quantum
Externí odkaz:
http://arxiv.org/abs/2205.12887
In a blockchain Data Availability Attack (DAA), a malicious node publishes a block header but withholds part of the block, which contains invalid transactions. Honest full nodes, which can download and store the full blockchain, are aware that some d
Externí odkaz:
http://arxiv.org/abs/2202.07265
ASBK (named after the authors' initials) is a recent blockchain protocol tackling data availability attacks against light nodes, employing two-dimensional Reed-Solomon codes to encode the list of transactions and a random sampling phase where adversa
Externí odkaz:
http://arxiv.org/abs/2201.08261