咨询与建议

限定检索结果

文献类型

  • 121 篇 会议
  • 83 篇 期刊文献
  • 4 篇 学位论文

馆藏范围

  • 208 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 198 篇 工学
    • 177 篇 计算机科学与技术...
    • 51 篇 电气工程
    • 29 篇 信息与通信工程
    • 22 篇 软件工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 网络空间安全
    • 2 篇 控制科学与工程
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
  • 94 篇 理学
    • 83 篇 数学
    • 15 篇 物理学
    • 1 篇 科学技术史(分学科...
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 208 篇 code-based crypt...
  • 63 篇 post-quantum cry...
  • 18 篇 rank metric
  • 15 篇 information set ...
  • 13 篇 decoding
  • 13 篇 mceliece cryptos...
  • 12 篇 digital signatur...
  • 12 篇 cryptanalysis
  • 12 篇 fpga
  • 12 篇 syndrome decodin...
  • 11 篇 public-key encry...
  • 11 篇 post quantum cry...
  • 11 篇 gabidulin codes
  • 8 篇 digital signatur...
  • 8 篇 provable securit...
  • 7 篇 qc-mdpc codes
  • 7 篇 syndrome decodin...
  • 6 篇 rank-metric code...
  • 6 篇 coding theory
  • 6 篇 key recovery att...

机构

  • 7 篇 technol innovat ...
  • 7 篇 natl univ singap...
  • 6 篇 aurel vlaicu uni...
  • 6 篇 univ limoges lim...
  • 5 篇 florida atlantic...
  • 4 篇 city univ hong k...
  • 4 篇 politecn milan m...
  • 4 篇 nankai univ cher...
  • 3 篇 univ limoges xli...
  • 3 篇 tech univ munich...
  • 3 篇 sandboxaq palo a...
  • 3 篇 inria rocquencou...
  • 3 篇 univ politecn ma...
  • 3 篇 sun yat sen univ...
  • 3 篇 ruhr univ bochum...
  • 3 篇 nankai univ lpmc...
  • 3 篇 tech univ munich...
  • 2 篇 natl res univ hi...
  • 2 篇 tech univ munich...
  • 2 篇 guangdong key la...

作者

  • 17 篇 gaborit philippe
  • 13 篇 cayrel pierre-lo...
  • 10 篇 wachter-zeh anto...
  • 10 篇 santini paolo
  • 9 篇 baldi marco
  • 9 篇 lau terry shue c...
  • 8 篇 tan chik how
  • 8 篇 renner julian
  • 7 篇 bellini emanuele
  • 7 篇 tillich jean-pie...
  • 7 篇 chiaraluce franc...
  • 6 篇 aragon nicolas
  • 6 篇 couvreur alain
  • 6 篇 gueye cheikh thi...
  • 6 篇 puchinger sven
  • 6 篇 persichetti edoa...
  • 6 篇 barenghi alessan...
  • 6 篇 pelosi gerardo
  • 6 篇 mateu victor
  • 5 篇 assidi hafsa

语言

  • 203 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=code-based cryptography"
208 条 记 录,以下是41-50 订阅
排序:
Area-Time Efficient Computation of Niederreiter Encryption on QC-MDPC codes for Embedded Hardware
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2017年 第8期66卷 1313-1325页
作者: Hu, Jingwei Cheung, Ray C. C. City Univ Hong Kong Dept Elect Engn Hong Kong Hong Kong Peoples R China
In this paper, we present a fast implementation for QC-MDPC Niederreiter encryption. Existing high-speed implementations are considerably resource involving but the solution we propose here mitigates such situation wh... 详细信息
来源: 评论
A code-based signature scheme from the Lyubashevsky framework
收藏 引用
THEORETICAL COMPUTER SCIENCE 2020年 835卷 15-30页
作者: Song, Yongcheng Huang, Xinyi Mu, Yi Wu, Wei Wang, Huaxiong Fujian Normal Univ Coll Math & Informat Fujian Prov Key Lab Network Secur & Cryptol Fuzhou 350117 Peoples R China Nanyang Technol Univ Sch Phys & Math Sci Div Math Sci Singapore 639798 Singapore
We propose a new method to construct code-based signature scheme following the Lyubashevsky's lattice-based framework. Our technique ensures that the Hamming weight of each row of the private key matrix is below t... 详细信息
来源: 评论
A toolbox for software optimization of QC-MDPC code-based cryptosystems
收藏 引用
JOURNAL OF CRYPTOGRAPHIC ENGINEERING 2019年 第4期9卷 341-357页
作者: Drucker, Nir Gueron, Shay Univ Haifa Haifa Israel Amazon Web Serv Inc Seattle WA 98109 USA
The anticipated emergence of quantum computers in the foreseeable future drives the cryptographic community to start considering cryptosystems, which are based on problems that remain intractable even with large-scale... 详细信息
来源: 评论
Efficient Encryption From Random Quasi-Cyclic codes
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2018年 第5期64卷 3927-3943页
作者: Aguilar-Melchor, Carlos Blazy, Olivier Deneuville, Jean-Christophe Gaborit, Philippe Zemor, Gilles Univ Toulouse INP ENSEEIHT F-31000 Toulouse France Univ Toulouse ISAE SUPAERO F-31000 Toulouse France Univ Limoges XLIM F-87060 Limoges France Univ Orleans LIFO F-18000 Bourges France INSA CVL F-18000 Bourges France Univ Bordeaux UMR 5251 IMB F-33405 Talence France
We propose a framework for constructing efficient code-based encryption schemes that do not hide any structure in their public matrix. The framework is in the spirit of the schemes first proposed by Alekhnovich in 200... 详细信息
来源: 评论
Integer syndrome decoding in the presence of noise
收藏 引用
cryptography AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES 2024年 第5期16卷 1103-1134页
作者: Dragoi, Vlad-Florin Colombier, Brice Cayrel, Pierre-Louis Grosso, Vincent Aurel Vlaicu Univ Arad Fac Exact Sci Arad Romania Univ Rouen Normandy LITIS Ave Univ F-76800 St Etienne Du Rouvray France Univ Lyon UJM St Etienne Lab Hubert Curien UMR 5516 CNRS F-42023 St Etienne France
code-based cryptography received attention after the NIST started the post-quantum cryptography standardization process in 2016. A central NP-hard problem is the binary syndrome decoding problem, on which the security... 详细信息
来源: 评论
LowMS: a new rank metric code-based KEM without ideal structure
收藏 引用
DESIGNS codeS AND cryptography 2024年 第4期92卷 1075-1093页
作者: Aragon, Nicolas Dyseryn, Victor Gaborit, Philippe Loidreau, Pierre Renner, Julian Wachter-Zeh, Antonia NAQUIDIS Ctr Talence France Univ Limoges XLIM Limoges France Univ Rennes DGA MI CNRS IRMAR Rennes France Tech Univ Munich Inst Commun Engn Munich Germany
We propose and analyze LowMS, a new rank-based key encapsulation mechanism (KEM). The acronym stands for Loidreau with Multiple Syndromes, since our work combines the cryptosystem of Loidreau (presented at PQCrypto 20... 详细信息
来源: 评论
A New Sieving-Style Information-Set Decoding Algorithm
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2024年 第11期70卷 8303-8319页
作者: Guo, Qian Johansson, Thomas Nguyen, Vu Lund Univ Dept Elect & Informat Technol Lund Sweden
The problem of decoding random codes is a fundamental problem for code-based cryptography, including recent code-based candidates in the NIST post-quantum standardization process. In this paper, we present a novel Sie... 详细信息
来源: 评论
MODRED: A code-based non-interactive key exchange protocol
收藏 引用
THEORETICAL COMPUTER SCIENCE 2024年 1021卷
作者: Pei, Junling Fu, Fang-Wei Nankai Univ Chern Inst Math Tianjin 300071 Peoples R China
How to construct a non-interactive key exchange (NIKE) protocol based on coding theory is an opening problem. In this paper, we propose the first code-based NIKE protocol MODRED, whose security relies on the hardness ... 详细信息
来源: 评论
Extended security arguments for signature schemes
收藏 引用
DESIGNS codeS AND cryptography 2016年 第2期78卷 441-461页
作者: Dagdelen, Ozgur Galindo, David Veron, Pascal Alaoui, Sidi Mohamed El Yousfi Cayrel, Pierre-Louis Tech Univ Darmstadt Darmstadt Germany LORIA CNRS Nancy France Univ Sud Toulon Var IML IMATH La Garde France Univ St Etienne Lab Hubert Curien St Etienne France
It is known how to transform certain canonical three-pass identification schemes into signature schemes via the Fiat-Shamir transform. Pointcheval and Stern showed that those schemes are existentially unforgeable in t... 详细信息
来源: 评论
code-based signatures from new proofs of knowledge for the syndrome decoding problem
收藏 引用
DESIGNS codeS AND cryptography 2023年 第2期91卷 497-544页
作者: Bidoux, Loic Gaborit, Philippe Kulkarni, Mukul Mateu, Victor Technol Innovat Inst Abu Dhabi U Arab Emirates Univ Limoges Limoges France
In this paper, we study code-based signatures constructed from Proofs of Knowledge (PoK). This line of work can be traced back to Stern who introduced the first efficient PoK for the syndrome decoding problem in 1993 ... 详细信息
来源: 评论