Search

Your search keyword '"McEliece cryptosystem"' showing total 652 results

Search Constraints

Start Over You searched for: Descriptor "McEliece cryptosystem" Remove constraint Descriptor: "McEliece cryptosystem"
652 results on '"McEliece cryptosystem"'

Search Results

2. An Efficient Implementation Scheme for Lattice Reduction in the List-Decoding Algorithm for the Binary Goppa Codes

3. Secure and Compact: A New Variant of McEliece Cryptosystem

4. HYBRID ASYMMETRIC CODE-BASED CRYPTOSYSTEM.

5. Finding Enumerators for Generalized (L, G)-Code.

6. A Hadamard Product of Linear Codes: Algebraic Properties and Algorithms for Calculating It.

7. Combinatorial Algorithms for Integer Syndrome Decoding Problem

8. Efficient and Novel Architecture of Golay Encoder and Decoder for McEliece Cryptosystem

9. On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight

11. Post-Quantum Cryptosystem of Niederreiter, Algorithm and Encryption Scheme: Modification and Optimization

12. Secure and Efficient Code-Based Cryptography for Multi-Party Computation and Digital Signatures †.

13. Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA.

14. Modern variations of McEliece and Niederreiter cryptosystems

18. Code-Based Cryptography With Generalized Concatenated Codes for Restricted Error Values

19. An Improved McEliece Cryptosystem Based on QC-LDPC Codes

20. An Improved Code-Based Encryption Scheme with a New Construction of Public Key

21. A New Code-Based Cryptosystem

22. Protograph-Based Decoding of Low-Density Parity-Check Codes with Hamming Weight Amplifiers

23. Secure and Efficient Code-Based Cryptography for Multi-Party Computation and Digital Signatures

24. An improved McEliece cryptosystem based on QC-MDPC code with compact key size.

25. On New Problems in Asymmetric Cryptography Based on Error-Resistant Coding.

26. On the design and security of Lee metric McEliece cryptosystems.

27. Quantum Resistant Public Key Encryption Scheme polarRLCE

28. Introduction

29. Practical Algebraic Attack on DAGS

30. An asymmetric cryptography using Gaussian integers

31. Joint QKD-Post-Quantum Cryptosystems

33. Assessing and Countering Reaction Attacks Against Post-Quantum Public-Key Cryptosystems Based on QC-LDPC Codes

34. Universal Secure Error-Correcting (SEC) Schemes for Network Coding via McEliece Cryptosystem Based on QC-LDPC Codes

36. A New Dynamic Code-Based Group Signature Scheme

37. Cryptanalysis of the Ivanov-Kabatiansky-Krouk-Rumenko Cryptosystems.

38. Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems

39. Cryptanalysis of a system based on twisted Reed–Solomon codes.

40. An asymmetric cryptography using Gaussian integers.

41. On the Support Splitting Algorithm for Induced Codes.

42. A Ring Signature Based on LDGM Codes

43. Masking Large Keys in Hardware: A Masked Implementation of McEliece

44. On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight

45. Generalized Concatenated Codes over Gaussian and Eisenstein Integers for Code-Based Cryptography

47. Differential Power Analysis of a McEliece Cryptosystem

48. Weaknesses in Two RFID Authentication Protocols

49. A New Class of Q-Ary Codes for the McEliece Cryptosystem

50. Using Low-Density Parity-Check codes to improve the McEliece cryptosystem.

Catalog

Books, media, physical & digital resources