咨询与建议

限定检索结果

文献类型

  • 121 篇 会议
  • 83 篇 期刊文献
  • 4 篇 学位论文

馆藏范围

  • 208 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 198 篇 工学
    • 177 篇 计算机科学与技术...
    • 51 篇 电气工程
    • 29 篇 信息与通信工程
    • 22 篇 软件工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 网络空间安全
    • 2 篇 控制科学与工程
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
  • 94 篇 理学
    • 83 篇 数学
    • 15 篇 物理学
    • 1 篇 科学技术史(分学科...
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 208 篇 code-based crypt...
  • 63 篇 post-quantum cry...
  • 18 篇 rank metric
  • 15 篇 information set ...
  • 13 篇 decoding
  • 13 篇 mceliece cryptos...
  • 12 篇 digital signatur...
  • 12 篇 cryptanalysis
  • 12 篇 fpga
  • 12 篇 syndrome decodin...
  • 11 篇 public-key encry...
  • 11 篇 post quantum cry...
  • 11 篇 gabidulin codes
  • 8 篇 digital signatur...
  • 8 篇 provable securit...
  • 7 篇 qc-mdpc codes
  • 7 篇 syndrome decodin...
  • 6 篇 rank-metric code...
  • 6 篇 coding theory
  • 6 篇 key recovery att...

机构

  • 7 篇 technol innovat ...
  • 7 篇 natl univ singap...
  • 6 篇 aurel vlaicu uni...
  • 6 篇 univ limoges lim...
  • 5 篇 florida atlantic...
  • 4 篇 city univ hong k...
  • 4 篇 politecn milan m...
  • 4 篇 nankai univ cher...
  • 3 篇 univ limoges xli...
  • 3 篇 tech univ munich...
  • 3 篇 sandboxaq palo a...
  • 3 篇 inria rocquencou...
  • 3 篇 univ politecn ma...
  • 3 篇 sun yat sen univ...
  • 3 篇 ruhr univ bochum...
  • 3 篇 nankai univ lpmc...
  • 3 篇 tech univ munich...
  • 2 篇 natl res univ hi...
  • 2 篇 tech univ munich...
  • 2 篇 guangdong key la...

作者

  • 17 篇 gaborit philippe
  • 13 篇 cayrel pierre-lo...
  • 10 篇 wachter-zeh anto...
  • 10 篇 santini paolo
  • 9 篇 baldi marco
  • 9 篇 lau terry shue c...
  • 8 篇 tan chik how
  • 8 篇 renner julian
  • 7 篇 bellini emanuele
  • 7 篇 tillich jean-pie...
  • 7 篇 chiaraluce franc...
  • 6 篇 aragon nicolas
  • 6 篇 couvreur alain
  • 6 篇 gueye cheikh thi...
  • 6 篇 puchinger sven
  • 6 篇 persichetti edoa...
  • 6 篇 barenghi alessan...
  • 6 篇 pelosi gerardo
  • 6 篇 mateu victor
  • 5 篇 assidi hafsa

语言

  • 203 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Code-based cryptography"
208 条 记 录,以下是201-210 订阅
排序:
Efficient code-based fully dynamic group signature scheme
收藏 引用
THEORETICAL COMPUTER SCIENCE 2024年 990卷
作者: Wang, Luping Chen, Jie Dai, Huan Tao, Chongben Suzhou Univ Sci & Technol Suzhou 215000 Jiangsu Peoples R China East China Normal Univ Shanghai Key Lab Trustworthy Comp Shanghai 200062 Peoples R China Jiangsu Key Lab Elevator Intelligent Safety Nantong 215506 Jiangsu Peoples R China
code -based group signature is an important research topic in recent years. Since the pioneering work by Alamelou et al.(WCC 2015), several other schemes have been proposed to provide improvements in security, efficie... 详细信息
来源: 评论
A new code-based designated verifier signature scheme
收藏 引用
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS 2018年 第17期31卷 e3803-e3803页
作者: Thanalakshmi, Perumal Anitha, Ramalingam PSG Coll Technol Dept Appl Math & Computat Sci Coimbatore Tamil Nadu India
Designated verifier signature (DVS) scheme allows the verifier to verify the signature of a message but prevents from transferring the conviction to any third party. This scheme is useful in circumstances where authen... 详细信息
来源: 评论
SPANSE: Combining sparsity with density for efficient one-time code-based digital signatures
收藏 引用
JOURNAL OF ALGEBRA AND ITS APPLICATIONS 2024年 第7期23卷
作者: Baldi, Marco Chiaraluce, Franco Santini, Paolo Univ Politecn Marche Dept Informat Engn Ancona Italy
The use of codes defined by sparse characteristic matrices, like QC-LDPC and QC-MDPC codes, has become an established solution to design secure and efficient code-based public-key encryption schemes, as also witnessed... 详细信息
来源: 评论
A Concurrent Signature Scheme from Coding Theory Assumptions
收藏 引用
ENGINEERING LETTERS 2023年 第2期31卷 603页
作者: Assidi, Hafsa Univ Mohammed 5 BP 1014 Rabat Morocco
Concurrent signature is considered as a type of fair exchange protocols. This signature allows two entities to exchange their signature in a fair manner. In that case, the two signatures are ambiguous until an extra p... 详细信息
来源: 评论
Cryptanalysis of the SHMW signature scheme
收藏 引用
HELIYON 2024年 第2期10卷 e24185页
作者: Lau, Terry Shue Chien Ariffin, Muhammad Rezal Kamel Yip, Sook-Chin Chin, Ji-Jian Ting, Choo-Yee Multimedia Univ Fac Comp & Informat Cyberjaya 63100 Selangor Malaysia Univ Putra Malaysia Dept Math & Stat Serdang 43400 Selangor Malaysia Univ Putra Malaysia Inst Math Res Serdang 43400 Selangor Malaysia Multimedia Univ Fac Engn Cyberjaya 63100 Selangor Malaysia Univ Plymouth Fac Sci & Engn Sch Engn Comp & Math Plymouth PL 48AA England
In recent research, Durandal, a signature scheme based on rank metrics following Schnorr's approach, was introduced to conceal secret key information by selectively manipulating the vector subspace of signatures. ... 详细信息
来源: 评论
code-based Schemes for Post-Quantum Digital Signatures
Code-Based Schemes for Post-Quantum Digital Signatures
收藏 引用
IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems
作者: Alexandr Kuznetsov Anastasiia Kiian Andriy Pushkar'ov Danylo Mialkovskyi Oleksii Smirnov Tetiana Kuznetsova V. N. Karazin Kharkiv National University State Service of Special Communication and Information Protection of Ukraine Central Ukrainian National Technical University
The paper deals with the design and principles of functioning of code-based schemes for formation and verification of electronic digital signature. Comparative studies of the effectiveness of the known CFS scheme and ... 详细信息
来源: 评论
A novel attack on McEliece's cryptosystem
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS- COMPUTER SYSTEMS THEORY 2023年 第3期8卷 178-191页
作者: Gray, Henry Battarbee, Christopher Shahandashti, Siamak F. F. Kahrobaei, Delaram Univ York York England
This report proposes a new and novel attack on McEliece's cryptosystem that improves on the probability of attacks formerly proposed by Stern, and Lee and *** day encryption standards have been long since proven i... 详细信息
来源: 评论
code-based Cryptosystems Evolution
Code-Based Cryptosystems Evolution
收藏 引用
International Conference on Engineering and Telecommunication
作者: Marina Samokhina Oksana Trushina Independent researcher Department of Radio Engineering and Cybernetics MIPT
This paper describes the original linear code-based cryptosystem and shows how it evolves after successful structural-based attacks have been discovered. All existing modifications of the original Niederreiter public-... 详细信息
来源: 评论