نتایج جستجو برای: code based cryptography

تعداد نتایج: 3061053  

Journal: :JSW 2011
Yang Ming Xiaoqin Shen Yamian Peng

A sanitizable signature scheme is a signature which allows a semi-trusted party called sanitizer to hide parts of the original message after the message is signed, without interacting with the signer. A verifier can confirm the integrity of disclosed parts of the sanitized document from the signature. Sanitizable signatures are quite useful in governmental or military offices, where there is a ...

1999
Alex Kasman

Of course, cryptography is necessary for a project such as the data haven, and, as the title would imply, discussions of codes and ciphers run throughout the book. Mathematicians with a background in cryptanalysis might be especially interested in a new output-feedback mode stream cipher formally introduced in this book for the first time. The code is described in greater detail in an appendix ...

2002
Michael Luby

We introduce LT codes, the first rateless erasure codes that are very efficient as the data length grows.

Journal: :IACR Cryptology ePrint Archive 2017
Hayo Baan Sauvik Bhattacharya Óscar García-Morchón Ronald Rietman Ludo Tolhuizen Jose Luis Torre-Arce Zhenfei Zhang

Cryptographic primitives that are secure against quantum computing are receiving growing attention with recent, steady advances in quantum computing and standardization initiatives in post-quantum cryptography by NIST and ETSI. Lattice-based cryptography is one of the families in post-quantum cryptography, demonstrating desirable features such as well-understood security, efficient performance,...

Journal: :Kìbernetika ta komp'ûternì tehnologìï 2022

Introduction. A rapid increase in the number of objects that simultaneously take part combat operations air requires improvement systems for recognizing military both terms qualitative and quantitative indicators. This development appropriate algorithms identifying new-generation "friend-foe" objects. Such can be based on various methods information security, particular symmetric asymmetric cry...

Journal: :Finite Fields and Their Applications 2017
Gaopeng Jian Rongquan Feng Hongfeng Wu

The generalized Hamming weights of a linear code have been extensively studied since Wei first use them to characterize the cryptography performance of a linear code over the wire-tap channel of type II. In this paper, we investigate the generalized Hamming weights of three classes of linear codes constructed through defining sets and determine them partly for some cases. Particularly, in the s...

2014
Srujan pentakota Maher Prasad

Cryptography is the science of writing in secret code and is an ancient art. Cryptography not only protects data from theft or alteration, but can also be used for user authentication.visual cryptography is a technique which allows visual information to be encrypted in such a way that the decryption can be performed by the human visual system. This paper introduces the concept of visual informa...

Journal: :IACR Cryptology ePrint Archive 2016
Takeshi Koshiba Katsuyuki Takashima

We put forth a new mathematical framework called Isogenous Pairing Groups (IPG) and new intractable assumptions in the framework, the Isogenous DBDH (Isog-DBDH) assumption and its variants. Three operations, i.e., exponentiation, pairing and isogeny on elliptic curves are treated under a unified notion of trapdoor homomorphisms, and combinations of the operations have potential new cryptographi...

2014
Sheetal C. Deshmukh

Security has become a curial aspect in the design and use of computer system and network. Hash functions are used for many applications in cryptography mainly in digital signatures and message authentication code and in network security. Keccak hash function has been submitted to SHA-3 competition. In this paper has implement “SHA-3 512 bit” hash function and high throughput cone designed to wo...

Journal: :International Journal of Computer Applications 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید