咨询与建议

限定检索结果

文献类型

  • 121 篇 会议
  • 83 篇 期刊文献
  • 4 篇 学位论文

馆藏范围

  • 208 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 198 篇 工学
    • 177 篇 计算机科学与技术...
    • 51 篇 电气工程
    • 29 篇 信息与通信工程
    • 22 篇 软件工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 网络空间安全
    • 2 篇 控制科学与工程
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
  • 94 篇 理学
    • 83 篇 数学
    • 15 篇 物理学
    • 1 篇 科学技术史(分学科...
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 208 篇 code-based crypt...
  • 63 篇 post-quantum cry...
  • 18 篇 rank metric
  • 15 篇 information set ...
  • 13 篇 decoding
  • 13 篇 mceliece cryptos...
  • 12 篇 digital signatur...
  • 12 篇 cryptanalysis
  • 12 篇 fpga
  • 12 篇 syndrome decodin...
  • 11 篇 public-key encry...
  • 11 篇 post quantum cry...
  • 11 篇 gabidulin codes
  • 8 篇 digital signatur...
  • 8 篇 provable securit...
  • 7 篇 qc-mdpc codes
  • 7 篇 syndrome decodin...
  • 6 篇 rank-metric code...
  • 6 篇 coding theory
  • 6 篇 key recovery att...

机构

  • 7 篇 technol innovat ...
  • 7 篇 natl univ singap...
  • 6 篇 aurel vlaicu uni...
  • 6 篇 univ limoges lim...
  • 5 篇 florida atlantic...
  • 4 篇 city univ hong k...
  • 4 篇 politecn milan m...
  • 4 篇 nankai univ cher...
  • 3 篇 univ limoges xli...
  • 3 篇 tech univ munich...
  • 3 篇 sandboxaq palo a...
  • 3 篇 inria rocquencou...
  • 3 篇 univ politecn ma...
  • 3 篇 sun yat sen univ...
  • 3 篇 ruhr univ bochum...
  • 3 篇 nankai univ lpmc...
  • 3 篇 tech univ munich...
  • 2 篇 natl res univ hi...
  • 2 篇 tech univ munich...
  • 2 篇 guangdong key la...

作者

  • 17 篇 gaborit philippe
  • 13 篇 cayrel pierre-lo...
  • 10 篇 wachter-zeh anto...
  • 10 篇 santini paolo
  • 9 篇 baldi marco
  • 9 篇 lau terry shue c...
  • 8 篇 tan chik how
  • 8 篇 renner julian
  • 7 篇 bellini emanuele
  • 7 篇 tillich jean-pie...
  • 7 篇 chiaraluce franc...
  • 6 篇 aragon nicolas
  • 6 篇 couvreur alain
  • 6 篇 gueye cheikh thi...
  • 6 篇 puchinger sven
  • 6 篇 persichetti edoa...
  • 6 篇 barenghi alessan...
  • 6 篇 pelosi gerardo
  • 6 篇 mateu victor
  • 5 篇 assidi hafsa

语言

  • 203 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=code-based cryptography"
208 条 记 录,以下是31-40 订阅
排序:
Area-Time-Efficient code-based Postquantum Key Encapsulation Mechanism on FPGA
收藏 引用
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS 2020年 第12期28卷 2672-2684页
作者: Phoon, Jun-Hoe Lee, Wai-Kong Wong, Denis Chee-Keong Yap, Wun-She Goi, Bok-Min Univ Tunku Abdul Rahman Lee Kong Chian Fac Engn & Sci Petaling Jaya 43000 Malaysia Gachon Univ Dept Comp Engn Seongnam 13120 South Korea
Postquantum cryptography attracts a lot of attention from the research community recently due to the emergence threat from quantum computer toward the conventional cryptographic schemes. In view of that, NIST had init... 详细信息
来源: 评论
Efficient error-correcting codes for the HQC post-quantum cryptosystem
收藏 引用
DESIGNS codeS AND cryptography 2024年 第12期92卷 4511-4530页
作者: Aguilar-Melchor, Carlos Aragon, Nicolas Deneuville, Jean-Christophe Gaborit, Philippe Lacan, Jerome Zemor, Gilles SandboxAQ Palo Alto CA USA Univ Limoges Limoges France Univ Toulouse Federat ENAC ISAE SUPAERO ONERA Toulouse France Univ Toulouse ISAE SUPAERO Toulouse France Univ Bordeaux IMB Bordeaux France
The HQC post-quantum cryptosystem enables two parties to share noisy versions of a common secret binary string, and an error-correcting code is required to deal with the mismatch between both versions. This code is re... 详细信息
来源: 评论
An efficient code-based threshold ring signature scheme
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2019年 第Apr.期45卷 52-60页
作者: Assidi, Hafsa Ayebie, Edoukou Berenger Souidi, El Mamoun Mohammed V Univ Rabat Fac Sci Lab Math Comp Sci Applicat & Informat Secur BP 1014 RP Rabat Morocco
code based cryptography is a powerful and a promising alternative to the number theoretic cryptography as it is supposed to resist to the quantum computer. The migration to the post quantum hypothetical world requires... 详细信息
来源: 评论
Toward Practical code-based Signature: Implementing Fast and Compact QC-LDGM Signature Scheme on Embedded Hardware
收藏 引用
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS 2017年 第8期64卷 2086-2097页
作者: Hu, Jingwei Cheung, Ray C. C. City Univ Hong Kong Dept Elect Engn Hong Kong Hong Kong Peoples R China
In this paper, fast and compact implementations for code-based signature are presented. Existing designs are either using enormous memory storage or suffering from slow issuing speed of signatures. A vastly optimized ... 详细信息
来源: 评论
Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
收藏 引用
DESIGNS codeS AND cryptography 2014年 第2期73卷 641-666页
作者: Couvreur, Alain Gaborit, Philippe Gauthier-Umana, Valerie Otmani, Ayoub Tillich, Jean-Pierre INRIA Saclay GRACE Project F-91120 Palaiseau France Ecole Polytech CNRS UMR 7161 LIX F-91120 Palaiseau France Univ Limoges CNRS UMR 7252 XLIM F-87060 Limoges France Univ Rosario Fac Nat Sci & Math Dept Math Bogota Colombia Normandie Univ LITIS UR F-76821 Mont St Aignan France INRIA Rocquencourt SECRET Project F-78153 Le Chesnay France
Because of their interesting algebraic properties, several authors promote the use of generalized Reed-Solomon codes in cryptography. Niederreiter was the first to suggest an instantiation of his cryptosystem with the... 详细信息
来源: 评论
A privacy-preserving code-based authentication protocol for Internet of Things
收藏 引用
JOURNAL OF SUPERCOMPUTING 2019年 第12期75卷 8231-8261页
作者: Chikouche, Noureddine Cayrel, Pierre-Louis Mboup, El Hadji Modou Boidje, Brice Odilon Univ Msila Comp Sci Dept BP 166 Ichebilia 28000 Msila Algeria CNRS UMR 5516 Lab Hubert Curien Batiment F18 Rue Prof Benoit Lauras F-42000 St Etienne France Univ Cheikh Anta Diop Dakar Lab Algebre Cryptog Geometrie Algebr & Applicat Dakar Senegal
The Internet of Things (IoT) is an upcoming technology that permits to interconnect different devices and machines using heterogeneous networks. One of the most critical issues in IoT is to secure communication betwee... 详细信息
来源: 评论
Extending Coggia-Couvreur attack on Loidreau's rank-metric cryptosystem
收藏 引用
DESIGNS codeS AND cryptography 2022年 第1期90卷 215-238页
作者: Ghatak, Anirban RC Bose Ctr Secur & Cryptol ISI Kolkata India
A recent paper by Coggia and Couvreur presents a polynomial time key-recovery attack on Loidreau's encryption scheme, based on rank-metric codes, for some parameters. Their attack was formulated for the particular... 详细信息
来源: 评论
On the dimension and structure of the square of the dual of a Goppa code
收藏 引用
DESIGNS codeS AND cryptography 2022年 第4期91卷 1351-1372页
作者: Mora, Rocco Tillich, Jean-Pierre INRIA Team COSMIQ 2 Rue Simone Iff F-75012 Paris France UPMC Univ Paris 06 Sorbonne Univ 4 Pl Jussieu F-75005 Paris France
The Goppa code distinguishing (GD) problem asks to distinguish efficiently a generator matrix of a Goppa code from a randomly drawn one. We revisit a distinguisher for alternant and Goppa codes through a new approach,... 详细信息
来源: 评论
A code-based group signature scheme
收藏 引用
DESIGNS codeS AND cryptography 2017年 第1-2期82卷 469-493页
作者: Alamelou, Quentin Blazy, Olivier Cauchie, Stephane Gaborit, Philippe Univ Limoges XLIM DMI Limoges France Worldline R&D Dept Seclin France
This work is the extended version of Alam,lou et al. (in: Tillich et al. (eds.) The 9th International workshop on coding and cryptography 2015 (WCC2015), 2015) which proposed the first code-based group signature. The ... 详细信息
来源: 评论
Information Theoretical Cryptogenography
收藏 引用
JOURNAL OF CRYPTOLOGY 2017年 第4期30卷 1067-1115页
作者: Jakobsen, Sune K. UCL Dept Comp Sci London England
We consider problems where n people are communicating and a random subset of them is trying to leak information, without making it clear who are leaking the information. We introduce a measure of suspicion and show th... 详细信息
来源: 评论