نتایج جستجو برای: code based cryptography

تعداد نتایج: 3061053  

Journal: :IACR Cryptology ePrint Archive 2017
Gustavo Banegas Paulo S. L. M. Barreto Brice Odilon Boidje Pierre-Louis Cayrel Gilbert Ndollane Dione Kris Gaj Cheikh Thiecoumba Gueye Richard Haeussler Jean Belo Klamti Ousmane Ndiaye Duc Tri Nguyen Edoardo Persichetti Jefferson E. Ricardini

Code-based Cryptography is one of the main areas of interest for the Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on Quasi-Dyadic Generalized Srivastava codes. The scheme is proved to be IND-CCA secure in both Random Oracle Model and Quantum Random Oracle Model. We believe that DAGS will offer competitive performance...

2018
Vasileios Mavroeidis Kamer Vishi Mateusz D. Zych Audun Josang

The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor’s ...

Journal: :Cryptography 2021

The code-based McEliece and Niederreiter cryptosystems are promising candidates for post-quantum public-key encryption. Recently, q-ary concatenated codes over Gaussian integers were proposed the cryptosystem, together with one-Mannheim error channel, where values limited to Mannheim weight one. Due values, achieve a higher correction capability than maximum distance separable (MDS) bounded min...

2011
Thomas Risse

Common cryptographic methods, especially Public Key Crypto Systems, PKCS based on difficulty to factor large integers or to compute the discrete logarithm, commonly deployed today will not resist attacks using quantum computers once these are operational. However, there are alternatives like hash based digital signature schemes, lattice based cryptography, or multivariatequadratic-equations pub...

2011
Thomas Risse

Common cryptographic methods, especially Public Key Crypto Systems, PKCS based on difficulty to factor large integers or to compute the discrete logarithm, commonly deployed today will not resist attacks using quantum computers once these are operational. However, there are alternatives like hash based digital signature schemes, lattice based cryptography, or multivariate-quadratic-equations pu...

2013
Hans Christoph Hudde Stefan Heyse

Code-based cryptography is a promising candidate for the diversification of today’s public-key cryptosystems, most of which rely on the hardness of either the Factorization or the Discrete logarithm problem. Both are known to be breakable using an efficient quantum algorithm due to Peter Shor. In contrast, Code-based cryptography is based on the problem of decoding unknown error-correcting code...

2010
Mohamed Elboukhari Mostafa Azizi Abdelmalek Azizi

Most cryptographic mechanisms, such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. The security of most modern cryptographic systems of key distribution mechanism is based on computational complexity and the extraordinary time needed to break the code. Qua...

2015
Ashish Anand

Code obfuscation is a set of program transformations that make program code and program execution difficult to analyze. First of all, obfuscation hinders manual inspection of program internals. By renaming variables and functions, and breaking down structures, it protects against reverse-engineering. It protects both storage and usage of keys, and it can hide certain properties such as a softwa...

2010
Sai Manoj

Cryptography and steganography, the art of transforming the code or the plain text into either the encrypted code or a pictures format, as used by the steganographic feature, is the matter of great deal in the modern world of the ruler "security". Everyone in the entire scenario now emphasizes the need for cryptography and steganography codegroup utility which encodes and decodes binary files i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید