نتایج جستجو برای: code based cryptography

تعداد نتایج: 3061053  

2010
Omessaad Hamdi Ammar Bouallegue Sami Harari

We propose a method to recover the structure of a randomly permuted chained code and how to cryptanalyse cryptographic schemes based on these kinds of error coding. As application of these methods is a cryptographic schema using regular Low Density Parity Check (LDPC) Codes. This result prohibits the use of chained code and particularly regular LDPC codes on cryptography.

2006
Jintai Ding Jason E. Gower Dieter Schmidt

As the title says, this book is about Multivariate cryptography. Besides code-, latticeand hash-based cryptosystems, Multivariate cryptography is one of the main fields of cryptosystems which are believed to be secure against attacks with quantum computers. Multivariate cryptography deals with systems of nonlinear polynomial equations in several variables over a finite field which are difficult...

2012
Akhil Kaushik Manoj Barnela Om Parkash

Once an application steps out of the bounds of a single-computer box, its external communication is immediately exposed to a multitude of outside observers with various intentions, good or bad. In order to protect sensitive data while these are en route, applications invoke different methods. In today's world, most of the means of secure data and code storage and distribution rely on using cryp...

2014
Harry Halpin

The W3C Web Cryptography API will be the standard API for accessing cryptographic primitives in Javascript-based environments. We describe the motivations behind the creation of the W3C Web Cryptography API, deal with a number of objections, and then describe the API in detail with motivating use-cases and sample code. Lastly, we outline open issues and how the wider academic and security commu...

Journal: :IACR Cryptology ePrint Archive 2017
Vasyl Ustimenko

We propose new multivariate cryptosystems over n-dimensional vector space over a finite field Fq based on idea of hidden discrete logarithm problem for F ∗ q. These cryptosystems are based on hidden eulerian equations x = a, (α, q − 1) = 1. The method is based on the idea of Eulerian transformations, which allow us to use asymmetric algorithms based on families of nonlinear multiplicatively inj...

Journal: :Indian Scientific Journal Of Research In Engineering And Management 2022

In Today’s world Sensitive data is increasingly used in communication over the internet. Thus Security of biggest concern internet users. Best solution use some cryptography algorithm which encrypts cipher and transfers it again decrypted to original data. The field deals with procedure for conveying information securely. Cryptography includes a set techniques scrambling or disguising so that a...

2010
Robert Niebuhr Pierre-Louis Cayrel Stanislav Bulygin Johannes Buchmann

Code-based cryptosystems are promising candidates for post-quantum cryptography. The increasing number of cryptographic schemes that are based on codes over fields different from F2 requires an analysis of their security. Information Set Decoding (ISD) is one of the most important generic attacks against code-based cryptosystems. We give lower bounds for ISD over Fq, thereby anticipating future...

Journal: :E3S web of conferences 2023

In the innovative work secure communication and data protection are being main field, which emerged by cryptography as a fundamental pillar. Strong cryptographic methods now essential given rising reliance on digital technologies threats posed bad actors. This abstract examines evolution of protocols techniques it relates to advancements in cryptography. The development post-quantum is most not...

A. Cheraghi , M. Hadian Dehkordi ,

 Abstract : A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper a maximal independent sets of the graph G was ...

Journal: :IACR Cryptology ePrint Archive 2012
K. Preetha Mathew Sachin Vasant C. Pandu Rangan

Signcryption is a cryptographic protocol that provides authentication and confidentiality as a single primitive at a cost lower than the combined cost of sign and encryption. Due to the improved efficiency, signcryption schemes have found significant applications in areas related to E-commerce. Shor’s algorithm [22] poses a threat to number-theoretic algorithms, as it can solve the number-theor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید