咨询与建议

限定检索结果

文献类型

  • 121 篇 会议
  • 82 篇 期刊文献
  • 4 篇 学位论文

馆藏范围

  • 207 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 197 篇 工学
    • 176 篇 计算机科学与技术...
    • 50 篇 电气工程
    • 29 篇 信息与通信工程
    • 21 篇 软件工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 网络空间安全
    • 2 篇 控制科学与工程
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
  • 94 篇 理学
    • 83 篇 数学
    • 15 篇 物理学
    • 1 篇 科学技术史(分学科...
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 207 篇 code-based crypt...
  • 63 篇 post-quantum cry...
  • 18 篇 rank metric
  • 15 篇 information set ...
  • 13 篇 mceliece cryptos...
  • 12 篇 decoding
  • 12 篇 cryptanalysis
  • 12 篇 fpga
  • 12 篇 syndrome decodin...
  • 11 篇 public-key encry...
  • 11 篇 digital signatur...
  • 11 篇 post quantum cry...
  • 11 篇 gabidulin codes
  • 8 篇 digital signatur...
  • 8 篇 provable securit...
  • 7 篇 qc-mdpc codes
  • 7 篇 syndrome decodin...
  • 6 篇 rank-metric code...
  • 6 篇 key recovery att...
  • 6 篇 public key

机构

  • 7 篇 technol innovat ...
  • 7 篇 natl univ singap...
  • 6 篇 aurel vlaicu uni...
  • 6 篇 univ limoges lim...
  • 5 篇 florida atlantic...
  • 4 篇 city univ hong k...
  • 4 篇 politecn milan m...
  • 4 篇 nankai univ cher...
  • 3 篇 univ limoges xli...
  • 3 篇 tech univ munich...
  • 3 篇 sandboxaq palo a...
  • 3 篇 inria rocquencou...
  • 3 篇 univ politecn ma...
  • 3 篇 sun yat sen univ...
  • 3 篇 ruhr univ bochum...
  • 3 篇 nankai univ lpmc...
  • 3 篇 tech univ munich...
  • 2 篇 natl res univ hi...
  • 2 篇 tech univ munich...
  • 2 篇 guangdong key la...

作者

  • 17 篇 gaborit philippe
  • 13 篇 cayrel pierre-lo...
  • 10 篇 wachter-zeh anto...
  • 10 篇 santini paolo
  • 9 篇 baldi marco
  • 9 篇 lau terry shue c...
  • 8 篇 tan chik how
  • 8 篇 renner julian
  • 7 篇 bellini emanuele
  • 7 篇 tillich jean-pie...
  • 7 篇 chiaraluce franc...
  • 6 篇 aragon nicolas
  • 6 篇 couvreur alain
  • 6 篇 gueye cheikh thi...
  • 6 篇 puchinger sven
  • 6 篇 persichetti edoa...
  • 6 篇 barenghi alessan...
  • 6 篇 pelosi gerardo
  • 6 篇 mateu victor
  • 5 篇 assidi hafsa

语言

  • 202 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=code-based cryptography"
207 条 记 录,以下是101-110 订阅
排序:
Cryptanalysis of Ivanov-Krouk-Zyablov Cryptosystem  1
收藏 引用
10th International Workshop on code-based cryptography (CBCrypto)
作者: Vedenev, Kirill Kosolapov, Yury Southern Fed Univ Rostov Na Donu Russia
Recently, F. Ivanov, E. Krouk and V. Zyablov proposed new cryptosystem based of Generalized Reed-Solomon (GRS) codes over field extensions. In their approach, the subfield images of GRS codes are masked by a special t... 详细信息
来源: 评论
Efficient Software Implementations of code-based Hash Functions and Stream-Ciphers  5
收藏 引用
5th International Workshop on the Arithmetic of Finite Fields (WAIFI)
作者: Cayrel, Pierre-Louis Meziani, Mohammed Ndiaye, Ousmane Santos, Quentin Lab Hubert Curien UMR CNRS 5516 F-42000 St Etienne France CASED Ctr Adv Secur Res Darmstadt D-64293 Darmstadt Germany Univ Cheikh Anta Diop Dakar FST DMI LACGAA Dakar Senegal Ecole Normale Super Lyon F-69007 Lyon France
In this work, we present a survey on software implementations of two families of cryptographic primitives based on the syndrome decoding problem: hash functions and stream ciphers. We have studied different algorithms... 详细信息
来源: 评论
Continuous Key Agreement with Reduced Bandwidth  1
收藏 引用
3rd International Symposium on Cyber Security cryptography and Machine Learning (CSCML)
作者: Drucker, Nir Gueron, Shay Univ Haifa Haifa Israel Amazon Seattle WA 98109 USA
Continuous Key Agreement (CKA) is a two-party procedure used by Double Ratchet protocols (e. g., Signal). This is a continuous and synchronous protocol that generates a fresh key for every sent/received message. It gu... 详细信息
来源: 评论
Take Your MEDS: Digital Signatures from Matrix code Equivalence  1
收藏 引用
14th International Conference on the Theory and Application of Cryptographic Techniques in Africa (AFRICACRYPT)
作者: Chou, Tung Niederhagen, Ruben Persichetti, Edoardo Randrianarisoa, Tovohery Hajatiana Reijnders, Krijn Samardjiska, Simona Trimoska, Monika Acad Sinica Taipei Taiwan Univ Southern Denmark Odense Denmark Florida Atlantic Univ Boca Raton FL 33431 USA Sapienza Univ Rome Italy Umea Univ Umea Sweden Radboud Univ Nijmegen Nijmegen Netherlands
In this paper, we show how to use the Matrix code Equivalence (MCE) problem as a new basis to construct signature schemes. This extends previous work on using isomorphism problems for signature schemes, a trend that h... 详细信息
来源: 评论
Repairing the Faure-Loidreau Public-Key Cryptosystem
Repairing the Faure-Loidreau Public-Key Cryptosystem
收藏 引用
IEEE International Symposium on Information Theory (ISIT)
作者: Wachter-Zeh, Antonia Puchinger, Sven Renner, Julian TUM Inst Commun Engn Munich Germany
A repair of the Faure-Loidreau (FL) public-key code-based cryptosystem is proposed. The FL cryptosystem is based on the hardness of list decoding Gabidulin codes which are special rank-metric codes. We prove that the ... 详细信息
来源: 评论
LRPC codes with Multiple Syndromes: Near Ideal-Size KEMs Without Ideals  13th
LRPC Codes with Multiple Syndromes: Near Ideal-Size KEMs Wit...
收藏 引用
13th International Conference on Post-Quantum cryptography (PQCrypto)
作者: Aguilar-Melchor, Carlos Aragon, Nicolas Dyseryn, Victor Gaborit, Philippe Zemor, Gilles SandboxAQ Palo Alto CA USA Univ Rennes IRISA INRIA CNRS Rennes France Univ Limoges XLIM Limoges France Inst Math Bordeaux UMR 5251 Bordeaux France
We introduce a new rank-based key encapsulation mechanism (KEM) with public key and ciphertext sizes around 3.5 Kbytes each, for 128 bits of security, without using ideal structures. Such structures allow to compress ... 详细信息
来源: 评论
Zero Knowledge Protocols and Signatures from the Restricted Syndrome Decoding Problem  27th
Zero Knowledge Protocols and Signatures from the Restricted ...
收藏 引用
27th IACR International Conference on Practice and Theory of Public Key cryptography (PKC)
作者: Baldi, Marco Bitzer, Sebastian Pavoni, Alessio Santini, Paolo Wachter-Zeh, Antonia Weger, Violetta Polytech Univ Marche Dept Informat Engn Brecce Bianche 12 I-60131 Ancona Italy Tech Univ Munich Inst Commun Engn Theresienstr 90 D-80333 Munich Germany
The Restricted Syndrome Decoding Problem (R-SDP) corresponds to the Syndrome Decoding Problem (SDP) with the additional constraint that all entries of the solution error vector must live in a fixed subset of the finit... 详细信息
来源: 评论
A New Encryption Scheme based on Rank Metric codes  23rd
A New Encryption Scheme Based on Rank Metric Codes
收藏 引用
23rd Australasian Conference on Information Security and Privacy (ACISP)
作者: Lau, Terry Shue Chien Tan, Chik How Natl Univ Singapore Temasek Labs 5A Engn Dr 109-02 Singapore 117411 Singapore
We propose a rank metric codes based encryption based on the hard problem of rank syndrome decoding problem. We distort the matrix used for our encryption by adding a random distortion matrix over F-qm. We show that I... 详细信息
来源: 评论
Information-Set Decoding with Hints  1
收藏 引用
9th International Workshop on code-based cryptography (CBCrypto)
作者: Horlemann, Anna-Lena Puchinger, Sven Renner, Julian Schamberger, Thomas Wachter-Zeh, Antonia Univ St Gallen Sch Comp Sci St Gallen Switzerland Tech Univ Munich TUM Munich Germany
This paper studies how to incorporate small information leakages (called "hints") into information-set decoding (ISD) algorithms. In particular, the influence of these hints on solving the (n, k, t)syndrome-... 详细信息
来源: 评论
On codes and Learning with Errors over Function Fields  42nd
On Codes and Learning with Errors over Function Fields
收藏 引用
42nd Annual International Cryptology Conference (CRYPTO)
作者: Bombar, Maxime Couvreur, Alain Debris-Alazard, Thomas Ecole Polytech Inst Polytech Paris LIX CNRS UMR 7161 1 Rue Honore Estienne Orves F-91120 Palaiseau France Inria Saclay Palaiseau France
It is a long standing open problem to find search to decision reductions for structured versions of the decoding problem of linear codes. Such results in the lattice-based setting have been carried out using number fi... 详细信息
来源: 评论