Zobrazeno 1 - 10
of 521
pro vyhledávání: '"code-based cryptography"'
Autor:
Terry Shue Chien Lau, Muhammad Rezal Kamel Ariffin, Sook-Chin Yip, Ji-Jian Chin, Choo-Yee Ting
Publikováno v:
Heliyon, Vol 10, Iss 2, Pp e24185- (2024)
In recent research, Durandal, a signature scheme based on rank metrics following Schnorr's approach, was introduced to conceal secret key information by selectively manipulating the vector subspace of signatures. Later, an enhancement, namely the SHM
Externí odkaz:
https://doaj.org/article/65b21a6b8f4946629b44e8509afe622a
Autor:
Klamti Jean Belo, Hasan M. Anwarul
Publikováno v:
Journal of Mathematical Cryptology, Vol 17, Iss 1, Pp 165-79 (2023)
A key encapsulation mechanism (KEM{\mathsf{KEM}}) that takes as input an arbitrary string, i.e., a tag, is known as tag-KEM{\mathsf{KEM}}, while a scheme that combines signature and encryption is called signcryption. In this article, we present a cod
Externí odkaz:
https://doaj.org/article/a889449c8b9b4d2e97be7df23aa65415
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 3 (2023)
In this paper, we present the first chosen-ciphertext (CC) cache-timing attacks on the reference implementation of HQC. We build a cache-timing based distinguisher for implementing a plaintext-checking (PC) oracle. The PC oracle uses side-channel inf
Externí odkaz:
https://doaj.org/article/f4c180f4118b44d1897bc0f5fe21bcd5
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Open Journal of the Communications Society, Vol 3, Pp 1528-1539 (2022)
Code-based cryptosystems are promising candidates for post-quantum cryptography. Recently, generalized concatenated codes over Gaussian and Eisenstein integers were proposed for those systems. For a channel model with errors of restricted weight, tho
Externí odkaz:
https://doaj.org/article/35d43f8ef05a466ca14d6f39fea848c4
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Journal of Mathematical Cryptology, Vol 16, Iss 1, Pp 20-48 (2021)
Structured linear block codes such as cyclic, quasi-cyclic and quasi-dyadic codes have gained an increasing role in recent years both in the context of error control and in that of code-based cryptography. Some well known families of structured linea
Externí odkaz:
https://doaj.org/article/67452fa856484ee7b2bf62d1b5ac6360
Publikováno v:
网络与信息安全学报, Vol 7, Iss 4, Pp 1-17 (2021)
The rapid development of quantum computing theory and practice brings great uncertainty to the security of cryptography based on hard problems in number theory. Code-based hard problem is recognized as NP-complete problem, the complexity increases ex
Externí odkaz:
https://doaj.org/article/5ad850db7fd245f6ae5accb9d2cc3263
Autor:
Manish Kumar
Publikováno v:
Array, Vol 15, Iss , Pp 100242- (2022)
-Quantum computer is no longer a hypothetical idea. It is the world's most important technology and there is a race among countries to get supremacy in quantum technology. It is the technology that will reduce the computing time from years to hours o
Externí odkaz:
https://doaj.org/article/989fea939c0948dea729b7aadd50d62d