咨询与建议

限定检索结果

文献类型

  • 121 篇 会议
  • 83 篇 期刊文献
  • 4 篇 学位论文

馆藏范围

  • 208 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 198 篇 工学
    • 177 篇 计算机科学与技术...
    • 51 篇 电气工程
    • 29 篇 信息与通信工程
    • 22 篇 软件工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 网络空间安全
    • 2 篇 控制科学与工程
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
  • 94 篇 理学
    • 83 篇 数学
    • 15 篇 物理学
    • 1 篇 科学技术史(分学科...
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 208 篇 code-based crypt...
  • 63 篇 post-quantum cry...
  • 18 篇 rank metric
  • 15 篇 information set ...
  • 13 篇 decoding
  • 13 篇 mceliece cryptos...
  • 12 篇 digital signatur...
  • 12 篇 cryptanalysis
  • 12 篇 fpga
  • 12 篇 syndrome decodin...
  • 11 篇 public-key encry...
  • 11 篇 post quantum cry...
  • 11 篇 gabidulin codes
  • 8 篇 digital signatur...
  • 8 篇 provable securit...
  • 7 篇 qc-mdpc codes
  • 7 篇 syndrome decodin...
  • 6 篇 rank-metric code...
  • 6 篇 coding theory
  • 6 篇 key recovery att...

机构

  • 7 篇 technol innovat ...
  • 7 篇 natl univ singap...
  • 6 篇 aurel vlaicu uni...
  • 6 篇 univ limoges lim...
  • 5 篇 florida atlantic...
  • 4 篇 city univ hong k...
  • 4 篇 politecn milan m...
  • 4 篇 nankai univ cher...
  • 3 篇 univ limoges xli...
  • 3 篇 tech univ munich...
  • 3 篇 sandboxaq palo a...
  • 3 篇 inria rocquencou...
  • 3 篇 univ politecn ma...
  • 3 篇 sun yat sen univ...
  • 3 篇 ruhr univ bochum...
  • 3 篇 nankai univ lpmc...
  • 3 篇 tech univ munich...
  • 2 篇 natl res univ hi...
  • 2 篇 tech univ munich...
  • 2 篇 guangdong key la...

作者

  • 17 篇 gaborit philippe
  • 13 篇 cayrel pierre-lo...
  • 10 篇 wachter-zeh anto...
  • 10 篇 santini paolo
  • 9 篇 baldi marco
  • 9 篇 lau terry shue c...
  • 8 篇 tan chik how
  • 8 篇 renner julian
  • 7 篇 bellini emanuele
  • 7 篇 tillich jean-pie...
  • 7 篇 chiaraluce franc...
  • 6 篇 aragon nicolas
  • 6 篇 couvreur alain
  • 6 篇 gueye cheikh thi...
  • 6 篇 puchinger sven
  • 6 篇 persichetti edoa...
  • 6 篇 barenghi alessan...
  • 6 篇 pelosi gerardo
  • 6 篇 mateu victor
  • 5 篇 assidi hafsa

语言

  • 203 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=code-based cryptography"
208 条 记 录,以下是1-10 订阅
排序:
Optimizing code-based cryptography for Efficient and Secure Post-Quantum Key Agreement
收藏 引用
Procedia Computer Science 2025年 259卷 1034-1048页
作者: Syed Shamikh Iqbal Aasim Zafar Department of Computer Science Aligarh Muslim University Aligarh India
Due to the quantum computing threat, RSA and ECC cryptography are at risk, necessitating the need for post-quantum cryptography. code-based cryptographic schemes, such as the McEliece system, have shown promise due to... 详细信息
来源: 评论
code-based cryptography: State of the Art and Perspectives
收藏 引用
IEEE SECURITY & PRIVACY 2017年 第4期15卷 44-50页
作者: Sendrier, Nicolas INRIA Rocquencourt France
code-based cryptography is one of the few mathematical techniques that enables the construction of public-key cryptosystems that are secure against an adversary equipped with a quantum computer. The McEliece public-ke... 详细信息
来源: 评论
code-based cryptography With Generalized Concatenated codes for Restricted Error Values
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY
收藏 引用
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY 2022年 3卷 1528-1539页
作者: Thiers, Johann-Philipp Freudenberger, Juergen Univ Appl Sci Inst Syst Dynam HTWG Konstanz D-78462 Constance Germany
code-based cryptosystems are promising candidates for post-quantum cryptography. Recently, generalized concatenated codes over Gaussian and Eisenstein integers were proposed for those systems. For a channel model with... 详细信息
来源: 评论
code-based cryptography
Code-based Cryptography
收藏 引用
作者: Jäämeri, Elias Aalto University
学位级别:硕士
Large enough quantum computers could run Shor’s algorithm to solve problems such as the integer factorization problem or the discrete logarithm problem in time frames unattainable by conventional computers. Popular i... 详细信息
来源: 评论
Compact Constant Weight Coding Engines for the code-based cryptography
收藏 引用
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS 2017年 第9期64卷 1092-1096页
作者: Hu, Jingwei Cheung, Ray C. C. Gueneysu, Tim City Univ Hong Kong Dept Elect Engn Hong Kong Hong Kong Peoples R China Univ Bremen Dept Math & Comp Sci D-28359 Bremen Germany
We present here a more memory efficient method for encoding binary information into words of prescribed length and weight. Existing solutions either require complicated float point arithmetic or additional memory over... 详细信息
来源: 评论
Probabilistic root finding in code-based cryptography
收藏 引用
JOURNAL OF CRYPTOGRAPHIC ENGINEERING 2024年 第1期14卷 71-85页
作者: Marchiori, Dunia Custodio, Ricardo Panario, Daniel Moura, Lucia Univ Fed Santa Catarina Programa Posgrad Ciencia Comp Florianopolis Brazil Carleton Univ Sch Math & Stat Ottawa ON Canada Univ Ottawa Sch Elect Engn & Comp Sci Ottawa ON Canada
Probabilistic algorithms for finding roots of polynomials have not been applied to code-based cryptography before. One obstacle is their non-constant execution time, since runtime variations can be exploited by side-c... 详细信息
来源: 评论
Rank-metric Encryption on Arm-Cortex M0 Porting code-based cryptography to lightweight devices  6
Rank-metric Encryption on Arm-Cortex M0 Porting code-based c...
收藏 引用
6th ACM ASIA Public-Key cryptography Workshop (APKC) / 3rd ACM Workshop on Blockchains, Cryptocurrencies and Contracts (BCC) / ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI)
作者: al Abdouli, A. Bellini, Emanuele Caullery, Florian Manzano, Marcos Mateu, Victor DarkMatter LLC Dubai U Arab Emirates
Since its invention by McEliece in 1978, cryptography based on Error Correcting codes (ECC) has suffered from the reputation of not being suitable for constrained devices. Indeed, McEliece's scheme and its variant... 详细信息
来源: 评论
The Tightness of Security Reductions in code-based cryptography
The Tightness of Security Reductions in Code-based Cryptogra...
收藏 引用
IEEE Information Theory Workshop (ITW)
作者: Sendrier, Nicolas Project Team SECRET Inria Rocquencourt France
code-based cryptography allows the construction of primitives with various functionalities. Those designs are in general secure and possess no undesirable features that cannot be corrected by a proper choice of parame... 详细信息
来源: 评论
Survey on Cryptanalysis of code-based cryptography: from Theoretical to Physical Attacks  7
Survey on Cryptanalysis of Code-Based Cryptography: from The...
收藏 引用
7th International Conference on Computers Communications and Control (ICCCC)
作者: Dragoi, Vlad Richmond, Tania Bucerzan, Dominic Legay, Axel Aurel Vlaicu Univ Arad Fac Exact Sci Arad Romania Inria Rennes Bretagne Atlantique TAMIS Team Rennes France
Nowadays public-key cryptography is based on number theory problems, such as computing the discrete logarithm on an elliptic curve or factoring big integers. Even though these problems are considered difficult to solv... 详细信息
来源: 评论
Introducing Arithmetic Failures to Accelerate QC-MDPC code-based cryptography  1
收藏 引用
7th International Workshop on code-based cryptography (CBC)
作者: Guimaraes, Antonio Borin, Edson Aranha, Diego F. Univ Estadual Campinas Inst Comp Sao Paulo Brazil Aarhus Univ Dept Engn Aarhus Denmark
In this work, we optimize the performance of QC-MDPC code-based cryptosystems through the insertion of configurable failure rates in their arithmetic procedures. We present constant time algorithms with a configurable... 详细信息
来源: 评论