咨询与建议

限定检索结果

文献类型

  • 121 篇 会议
  • 83 篇 期刊文献
  • 4 篇 学位论文

馆藏范围

  • 208 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 198 篇 工学
    • 177 篇 计算机科学与技术...
    • 51 篇 电气工程
    • 29 篇 信息与通信工程
    • 22 篇 软件工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 网络空间安全
    • 2 篇 控制科学与工程
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
  • 94 篇 理学
    • 83 篇 数学
    • 15 篇 物理学
    • 1 篇 科学技术史(分学科...
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 208 篇 code-based crypt...
  • 63 篇 post-quantum cry...
  • 18 篇 rank metric
  • 15 篇 information set ...
  • 13 篇 decoding
  • 13 篇 mceliece cryptos...
  • 12 篇 digital signatur...
  • 12 篇 cryptanalysis
  • 12 篇 fpga
  • 12 篇 syndrome decodin...
  • 11 篇 public-key encry...
  • 11 篇 post quantum cry...
  • 11 篇 gabidulin codes
  • 8 篇 digital signatur...
  • 8 篇 provable securit...
  • 7 篇 qc-mdpc codes
  • 7 篇 syndrome decodin...
  • 6 篇 rank-metric code...
  • 6 篇 coding theory
  • 6 篇 key recovery att...

机构

  • 7 篇 technol innovat ...
  • 7 篇 natl univ singap...
  • 6 篇 aurel vlaicu uni...
  • 6 篇 univ limoges lim...
  • 5 篇 florida atlantic...
  • 4 篇 city univ hong k...
  • 4 篇 politecn milan m...
  • 4 篇 nankai univ cher...
  • 3 篇 univ limoges xli...
  • 3 篇 tech univ munich...
  • 3 篇 sandboxaq palo a...
  • 3 篇 inria rocquencou...
  • 3 篇 univ politecn ma...
  • 3 篇 sun yat sen univ...
  • 3 篇 ruhr univ bochum...
  • 3 篇 nankai univ lpmc...
  • 3 篇 tech univ munich...
  • 2 篇 natl res univ hi...
  • 2 篇 tech univ munich...
  • 2 篇 guangdong key la...

作者

  • 17 篇 gaborit philippe
  • 13 篇 cayrel pierre-lo...
  • 10 篇 wachter-zeh anto...
  • 10 篇 santini paolo
  • 9 篇 baldi marco
  • 9 篇 lau terry shue c...
  • 8 篇 tan chik how
  • 8 篇 renner julian
  • 7 篇 bellini emanuele
  • 7 篇 tillich jean-pie...
  • 7 篇 chiaraluce franc...
  • 6 篇 aragon nicolas
  • 6 篇 couvreur alain
  • 6 篇 gueye cheikh thi...
  • 6 篇 puchinger sven
  • 6 篇 persichetti edoa...
  • 6 篇 barenghi alessan...
  • 6 篇 pelosi gerardo
  • 6 篇 mateu victor
  • 5 篇 assidi hafsa

语言

  • 203 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=code-based cryptography"
208 条 记 录,以下是21-30 订阅
排序:
Advances and Challenges of Rank Metric cryptography Implementations  37
Advances and Challenges of Rank Metric Cryptography Implemen...
收藏 引用
37th IEEE International Conference on Computer Design (ICCD)
作者: Bellini, Emanuele Caullery, Florian Makarim, Rusydi Manzano, Marc Marcolla, Chiara Mateu, Victor Technol Innovat Inst Crypto Ctr Abu Dhabi U Arab Emirates
Recent works on reducing the size of Error Correcting codes have investigated the usage of rank metric instead of Hamming metric. Numerous proposals for the NIST Post-Quantum cryptography competition, including four s... 详细信息
来源: 评论
The Rank-based cryptography Library  1
收藏 引用
9th International Workshop on code-based cryptography (CBCrypto)
作者: Aragon, Nicolas Bettaieb, Slim Bidoux, Loic Connan, Yann Coulaud, Jeremie Gaborit, Philippe Kominiarz, Anais Univ Limoges Limoges France Worldline Seclin France Technol Innovat Inst Abu Dhabi U Arab Emirates
Rank-based cryptography provides cryptosystems that aim to be secure against both classical and quantum computers. In the past few years, the interest for code-based cryptography in the rank metric setting has tremend... 详细信息
来源: 评论
An improved Durandal signature scheme
收藏 引用
Science China(Information Sciences) 2020年 第3期63卷 140-155页
作者: Yongcheng SONG Xinyi HUANG Yi MU Wei WU Fujian Provincial Key Laboratory of Network Security and Cryptology College of Mathematics and InformaticsFujian Normal University
Constructing secure and effective code-based signature schemes has been an open problem. In this paper, we efficiently reduce the key size of the Durandal signature scheme introduced by Aragon et al.(EUROCRYPT 2019). ... 详细信息
来源: 评论
Compact code-based Signature for Reconfigurable Devices With Side Channel Resilience
收藏 引用
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS 2020年 第7期67卷 2305-2316页
作者: Hu, Jingwei Liu, Yao Cheung, Ray C. C. Bhasin, Shivam Ling, San Wang, Huaxiong Nanyang Technol Univ Sch Phys & Math Sci Singapore 639798 Singapore City Univ Hong Kong Dept Elect Engn Hong Kong Peoples R China Nanyang Technol Univ Temasek Labs Singapore 639798 Singapore
In this paper, we present a compact design for the code based signature called LEDAsig with side channel resistance. Existing implementations concentrate on the high-speed feature while few of them have considerations... 详细信息
来源: 评论
ECC2: Error correcting code and elliptic curve based cryptosystem
收藏 引用
INFORMATION SCIENCES 2020年 526卷 301-320页
作者: Zhang, Fangguo Zhang, Zhuoran Guan, Peidong Sun Yat Sen Univ Sch Data & Comp Sci Guangzhou 510006 Peoples R China Guangdong Key Lab Informat Secur Guangzhou 510006 Peoples R China
code-based cryptography has aroused wide public concern as one of the main candidates for post quantum cryptography to resist attacks against cryptosystems from quantum computation. However, the large key size becomes... 详细信息
来源: 评论
Generalized Low-Rank Parity-Check codes
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2024年 第8期70卷 5589-5605页
作者: Franch, Ermes Gaborit, Philippe Li, Chunlei Univ Bergen Dept Informat N-5008 Bergen Norway Univ Limoges XLIM F-87032 Limoges France
Let F(q )be the finite field with q elements and m be a positive integer. The Fqm -linear low-rank parity-check (LRPC) codes have been used in many cryptographic schemes. Motivated by recent attacks on those schemes, ... 详细信息
来源: 评论
New code-based cryptographic accumulator and fully dynamic group signature
收藏 引用
DESIGNS codeS AND cryptography 2022年 第12期90卷 2861-2891页
作者: Ayebie, Edoukou Berenger Souidi, El Mamoun Mohammed V Univ Rabat Fac Sci Lab Math Comp Sci Applicat & Informat Secur BP 1014 RP Rabat Morocco
A cryptographic accumulator is a cryptographic primitive which produces a succinct aggregate of a set of elements. This type of scheme allows to produce a membership proof for each element of the set. In this paper, w... 详细信息
来源: 评论
Smooth Projective Hash Function From codes and its Applications
收藏 引用
IEEE TRANSACTIONS ON SERVICES COMPUTING 2022年 第6期15卷 3541-3553页
作者: Shooshtari, Masoumeh Koochak Aref, Mohammad Reza Sharif Univ Technol Dept Elect Engn Informat Syst & Secur Lab ISSL Tehran *** Iran
Nowadays, Smooth Projective Hash Functions (SPHFs) play an important role in constructing cryptographic tools such as secure Password-based Authenticated Key Exchange (PAKE) protocol in the standard model, oblivious t... 详细信息
来源: 评论
LIGA: a cryptosystem based on the hardness of rank-metric list and interleaved decoding
收藏 引用
DESIGNS codeS AND cryptography 2021年 第6期89卷 1279-1319页
作者: Renner, Julian Puchinger, Sven Wachter-Zeh, Antonia Tech Univ Munich TUM Inst Commun Engn Munich Germany Tech Univ Denmark DTU Dept Appl Math & Comp Sci Lyngby Denmark
We propose the new rank-metric code-based cryptosystem LIGA which is based on the hardness of list decoding and interleaved decoding of Gabidulin codes. LIGA is an improved variant of the Faure-Loidreau (FL) system, w... 详细信息
来源: 评论
On Design of Single-Layer and Multilayer code-based Linkable Ring Signatures
收藏 引用
IEEE ACCESS 2020年 8卷 17854-17862页
作者: Ren, Yan Zhao, Qiuxia Guan, Haipeng Lin, Zhiqiang Yuncheng Univ Sch Math & Informat Technol Yuncheng 044000 Peoples R China Guangzhou Univ Sch Math & Informat Sci Guangzhou 510006 Guangdong Peoples R China
In this paper, we present an effective code-based linkable ring signature scheme based on Borromean ring signature. The security of the scheme is based on the hardness of Syndrome Decoding problem, General Syndrome De... 详细信息
来源: 评论