咨询与建议

限定检索结果

文献类型

  • 121 篇 会议
  • 83 篇 期刊文献
  • 4 篇 学位论文

馆藏范围

  • 208 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 198 篇 工学
    • 177 篇 计算机科学与技术...
    • 51 篇 电气工程
    • 29 篇 信息与通信工程
    • 22 篇 软件工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 网络空间安全
    • 2 篇 控制科学与工程
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
  • 94 篇 理学
    • 83 篇 数学
    • 15 篇 物理学
    • 1 篇 科学技术史(分学科...
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 208 篇 code-based crypt...
  • 63 篇 post-quantum cry...
  • 18 篇 rank metric
  • 15 篇 information set ...
  • 13 篇 decoding
  • 13 篇 mceliece cryptos...
  • 12 篇 digital signatur...
  • 12 篇 cryptanalysis
  • 12 篇 fpga
  • 12 篇 syndrome decodin...
  • 11 篇 public-key encry...
  • 11 篇 post quantum cry...
  • 11 篇 gabidulin codes
  • 8 篇 digital signatur...
  • 8 篇 provable securit...
  • 7 篇 qc-mdpc codes
  • 7 篇 syndrome decodin...
  • 6 篇 rank-metric code...
  • 6 篇 coding theory
  • 6 篇 key recovery att...

机构

  • 7 篇 technol innovat ...
  • 7 篇 natl univ singap...
  • 6 篇 aurel vlaicu uni...
  • 6 篇 univ limoges lim...
  • 5 篇 florida atlantic...
  • 4 篇 city univ hong k...
  • 4 篇 politecn milan m...
  • 4 篇 nankai univ cher...
  • 3 篇 univ limoges xli...
  • 3 篇 tech univ munich...
  • 3 篇 sandboxaq palo a...
  • 3 篇 inria rocquencou...
  • 3 篇 univ politecn ma...
  • 3 篇 sun yat sen univ...
  • 3 篇 ruhr univ bochum...
  • 3 篇 nankai univ lpmc...
  • 3 篇 tech univ munich...
  • 2 篇 natl res univ hi...
  • 2 篇 tech univ munich...
  • 2 篇 guangdong key la...

作者

  • 17 篇 gaborit philippe
  • 13 篇 cayrel pierre-lo...
  • 10 篇 wachter-zeh anto...
  • 10 篇 santini paolo
  • 9 篇 baldi marco
  • 9 篇 lau terry shue c...
  • 8 篇 tan chik how
  • 8 篇 renner julian
  • 7 篇 bellini emanuele
  • 7 篇 tillich jean-pie...
  • 7 篇 chiaraluce franc...
  • 6 篇 aragon nicolas
  • 6 篇 couvreur alain
  • 6 篇 gueye cheikh thi...
  • 6 篇 puchinger sven
  • 6 篇 persichetti edoa...
  • 6 篇 barenghi alessan...
  • 6 篇 pelosi gerardo
  • 6 篇 mateu victor
  • 5 篇 assidi hafsa

语言

  • 203 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=code-based cryptography"
208 条 记 录,以下是91-100 订阅
排序:
On Decoding and Applications of Interleaved Goppa codes
On Decoding and Applications of Interleaved Goppa Codes
收藏 引用
IEEE International Symposium on Information Theory (ISIT)
作者: Holzbaur, Lukas Liu, Hedongliang Puchinger, Sven Wachter-Zeh, Antonia TUM Inst Commun Engn Munich Germany
Goppa codes are a well-known class of codes with, among others, applications in code-based cryptography. In this paper, we present a collaborative decoding algorithm for interleaved Goppa codes (IGC). Collaborative de... 详细信息
来源: 评论
FPGA-based Key Generator for the Niederreiter Cryptosystem Using Binary Goppa codes  19th
FPGA-based Key Generator for the Niederreiter Cryptosystem U...
收藏 引用
19th International Conference on Cryptographic Hardware and Embedded Systems (CHES)
作者: Wang, Wen Szefer, Jakub Niederhagen, Ruben Yale Univ New Haven CT 06511 USA Fraunhofer Inst SIT Darmstadt Germany
This paper presents a post-quantum secure, efficient, and tunable FPGA implementation of the key-generation algorithm for the Niederreiter cryptosystem using binary Goppa codes. Our key-generator implementation requir... 详细信息
来源: 评论
A Polynomial-Time Attack on the BBCRS Scheme  18
A Polynomial-Time Attack on the BBCRS Scheme
收藏 引用
18th IACR International Conference on Practice and Theory in Public-Key cryptography (PKC)
作者: Couvreur, Alain Otmani, Ayoub Tillich, Jean-Pierre Gauthier-Umana, Valerie INRIA Secret Team F-78153 Le Chesnay France INRIA Grace Team 1 Rue H dEstienne dOrves F-91120 Palaiseau France Ecole Polytech Grace Team F-91120 Palaiseau France Ecole Polytech LIX CNRS UMR 7161 F-91120 Palaiseau France Univ Rouen LITIS F-76821 Mont St Aignan France Univ Rosario Dept Math Fac Nat Sci & Math Bogota Colombia
The BBCRS scheme is a variant of the McEliece public-key encryption scheme where the hiding phase is performed by taking the inverse of a matrix which is of the form T vertical bar R where T is a sparse matrix with av... 详细信息
来源: 评论
Zero Knowledge Protocols and Signatures from the Restricted Syndrome Decoding Problem  27th
Zero Knowledge Protocols and Signatures from the Restricted ...
收藏 引用
27th IACR International Conference on Practice and Theory of Public Key cryptography (PKC)
作者: Baldi, Marco Bitzer, Sebastian Pavoni, Alessio Santini, Paolo Wachter-Zeh, Antonia Weger, Violetta Polytech Univ Marche Dept Informat Engn Brecce Bianche 12 I-60131 Ancona Italy Tech Univ Munich Inst Commun Engn Theresienstr 90 D-80333 Munich Germany
The Restricted Syndrome Decoding Problem (R-SDP) corresponds to the Syndrome Decoding Problem (SDP) with the additional constraint that all entries of the solution error vector must live in a fixed subset of the finit... 详细信息
来源: 评论
Weak Keys in the Faure-Loidreau Cryptosystem  1
收藏 引用
7th International Workshop on code-based cryptography (CBC)
作者: Jerkovits, Thomas Bartz, Hannes Deutsch Zentrum Luft & Raumfahrt DLR Inst Commun & Nav D-82234 Wessling Germany
Some types of weak keys in the Faure-Loidreau (FL) cryptosystem are presented. We show that from such weak keys the private key can be reconstructed with a computational effort that is substantially lower than the sec... 详细信息
来源: 评论
MURAVE: A New Rank code-based Signature with MUltiple RAnk VErification  1
收藏 引用
8th International Workshop on code-based cryptography (CBCrypto)
作者: Lau, Terry Shue Chien Tan, Chik How Natl Univ Singapore Temasek Labs 5A Engn Dr 1 09-02 Singapore 117411 Singapore
We propose a new rank metric code-based signature scheme constructed via the Schnorr approach. Our scheme is designed in a way to avoid leakage of the information on the support for the secret key used in the signatur... 详细信息
来源: 评论
Identity-based Encryption from codes with Rank Metric  37th
Identity-Based Encryption from Codes with Rank Metric
收藏 引用
37th Annual International Cryptology Conference (Crypto)
作者: Gaborit, Philippe Hauteville, Adrien Duong Hieu Phan Tillich, Jean-Pierre Univ Limoges XLIM DMI 123 Av Albert Thomas F-87060 Limoges France Inria Paris 2 Rue Simone IffCS 42112 F-75589 Paris 12 France
code-based cryptography has a long history, almost as long as the history of public-key encryption (PKE). While we can construct almost all primitives from codes such as PKE, signature, group signature etc., it is a l... 详细信息
来源: 评论
Memory-Efficient Quantum Information Set Decoding Algorithm  28th
Memory-Efficient Quantum Information Set Decoding Algorithm
收藏 引用
28th Australasian Conference on Information Security and Privacy (ACISP)
作者: Kimura, Naoto Takayasu, Atsushi Takagi, Tsuyoshi Univ Tokyo Grad Sch Informat Sci & Technol Tokyo Japan Natl Inst Adv Ind Sci & Technol Tokyo Japan
code-based cryptography is a candidate for post-quantum cryptography and the security of code-based cryptosystems relate to the hardness of the syndrome decoding problem. The Information Set Decoding (ISD) algorithm i... 详细信息
来源: 评论
Key-Recovery by Side-Channel Information on the Matrix-Vector Product in code-based Cryptosystems  25th
Key-Recovery by Side-Channel Information on the Matrix-Vecto...
收藏 引用
25th International Conference on Information Security and Cryptology (ICISC)
作者: Seck, Boly Cayrel, Pierre-Louis Diop, Idy Dragoi, Vlad-Florin Couzon, Kalen Colombier, Brice Grosso, Vincent Lab Imagerie Med & Bioinformat ESP Dakar Senegal Univ Lyon CNRS Lab Hubert Curien UJM St EtienneUMR 5516 F-42023 St Etienne France Univ Versailles St Quentin Yvelines France Aurel Vlaicu Univ Arad Fac Exact Sci Arad Romania
The modern security protocols in most of our systems rely primarily on three basic functions of asymmetric cryptography: public key encryption, digital signature, and key exchange. Today, we only do key exchange (TLS ... 详细信息
来源: 评论
Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security  11th
Encryption Schemes Using Random Oracles: From Classical to P...
收藏 引用
11th International Conference on Post-Quantum cryptography (PQCrypto)
作者: Kraemer, Juliane Struck, Patrick Tech Univ Darmstadt Darmstadt Germany
The security proofs of post-quantum cryptographic schemes often consider only classical adversaries. Therefore, whether such schemes are really post-quantum secure remains unknown until the proofs take quantum adversa... 详细信息
来源: 评论