We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 638 results
  1. Skew differential Goppa codes and their application to Mceliece cryptosystem

    A class of linear codes that extends classical Goppa codes to a non-commutative context is defined. An efficient decoding algorithm, based on the...

    José Gómez-Torrecillas, F. J. Lobillo, Gabriel Navarro in Designs, Codes and Cryptography
    Article Open access 19 August 2023
  2. Secure Data Storage in Cloud Computing Using Code Based McEliece and NTRU Cryptosystems

    Information must be kept private and secure because it is shared when people communicate online, making data protection essential. Data sharing is a...

    Geetha Rani E, Chetana Tukkoji in SN Computer Science
    Article 04 April 2024
  3. UC Analysis of the Randomized McEliece Cryptosystem

    In this paper, we will examine the UC (Universal Composability) security of an improved version of the McEliece cryptosystem, namely the Randomized...
    Conference paper 2022
  4. A New Approach Based on Quadratic Forms to Attack the McEliece Cryptosystem

    We introduce a novel algebraic approach for attacking the McEliece cryptosystem which is currently at the 4-th round of the NIST competition. The...
    Alain Couvreur, Rocco Mora, Jean-Pierre Tillich in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  5. Two modifications for Loidreau’s code-based cryptosystem

    This paper presents two modifications for Loidreau’s cryptosystem, a rank metric-based cryptosystem constructed by using Gabidulin codes in the...

    Article 16 August 2022
  6. On the design and security of Lee metric McEliece cryptosystems

    Recently, Horlemann-Trautmann and Weger (Adv Math Commun, https://doi.org/10.3934/amc.2020089 , 2020) proposed a general framework for a Quaternary...

    Terry Shue Chien Lau, Chik How Tan in Designs, Codes and Cryptography
    Article 18 January 2022
  7. Efficient Implementation of the Classic McEliece on ARMv8 Processors

    Classic McEliece is a Code-based Key Encapsulation Mechanisms (KEM) and one of the candidate algorithms in the NIST PQC competition. Based on the...
    Minjoo Sim, Hyeokdong Kwon, ... Hwajeong Seo in Information Security Applications
    Conference paper 2024
  8. A Side-Channel Attack Against Classic McEliece When Loading the Goppa Polynomial

    The NIST Post-Quantum Cryptography (PQC) standardization challenge was launched in December 2016 and recently, has released its first results. The...
    Boly Seck, Pierre-Louis Cayrel, ... Brice Colombier in Progress in Cryptology - AFRICACRYPT 2023
    Conference paper 2023
  9. Finding Enumerators for Generalized (L, G)-Code

    Abstract

    The algorithm for finding the enumerators of degree 2 and higher for the generalized ( L G )‑code is presented. This algorithm makes it...

    I. K. Noskov, S. V. Bezzateev in Automatic Control and Computer Sciences
    Article 01 December 2023
  10. Moderate Classical McEliece Keys from Quasi-Centrosymmetric Goppa Codes

    As the development of quantum machines is booming and would threaten our standard cryptography algorithms, a transition period is necessary for the...
    Conference paper 2023
  11. A Safety-Critical, RISC-V SoC Integrated and ASIC-Ready Classic McEliece Accelerator

    Security is an integral part of ensuring the integrity of safety-critical systems. Safety-critical systems with extremely long-lifespan, such as the...
    Vatistas Kostalabros, Jordi Ribes-González, ... Carles Hernandez in Applied Reconfigurable Computing. Architectures, Tools, and Applications
    Conference paper 2024
  12. Cryptanalysis of Ivanov–Krouk–Zyablov Cryptosystem

    Recently, F. Ivanov, E. Krouk and V. Zyablov proposed new cryptosystem based of Generalized Reed–Solomon (GRS) codes over field extensions. In their...
    Kirill Vedenev, Yury Kosolapov in Code-Based Cryptography
    Conference paper 2023
  13. How to Backdoor (Classic) McEliece and How to Guard Against Backdoors

    We show how to backdoor the McEliece cryptosystem such that a backdoored public key is indistinguishable from a usual public key, but allows to...
    Tobias Hemmert, Alexander May, ... Carl Richard Theodor Schneider in Post-Quantum Cryptography
    Conference paper 2022
  14. McEliece-Type Encryption Based on Gabidulin Codes with No Hidden Structure

    This paper presents a new McEliece-type public key encryption scheme based on Gabidulin codes, which uses linearized transformations to disguise the...
    Wenshuo Guo, Fang-Wei Fu in Information Security and Cryptology
    Conference paper 2023
  15. Key-Recovery Fault Injection Attack on the Classic McEliece KEM

    We present a key-recovery fault injection attack on the Classic McEliece Key Encapsulation Mechanism (KEM). The fault injections target the...
    Sabine Pircher, Johannes Geier, ... Antonia Wachter-Zeh in Code-Based Cryptography
    Conference paper 2023
  16. Security and Complexity of a New Variant of the McEliece Cryptosystem Using Non-linear Convolutional Codes

    The McEliece public-key cryptography (PKC) has fewer encryption/decryption operations compared to other PKC schemes such as RSA, ECC, and ElGamal....
    Michael Ekonde Sone in E-Business and Telecommunications
    Conference paper 2021
  17. Verifying Classic McEliece: Examining the Role of Formal Methods in Post-Quantum Cryptography Standardisation

    Developers of computer-aided cryptographic tools are optimistic that formal methods will become a vital part of develo** new cryptographic systems....
    Martin Brain, Carlos Cid, ... Wrenna Robson in Code-Based Cryptography
    Conference paper 2023
  18. Comparative Study on the McEliece Public-Key Cryptosystem Based on Goppa and QC-MDPC Codes

    In recent years, much research has been conducted on quantum computers – machine that exploit the phenomena of quantum mechanics to solve difficult...
    Es-said Azougaghe, Abderrazak Farchane, ... Ali Azougaghe in Business Intelligence
    Conference paper 2021
  19. Decoding McEliece with a Hint – Secret Goppa Key Parts Reveal Everything

    We consider the McEliece cryptosystem with a binary Goppa code $$C \subset...
    Elena Kirshanova, Alexander May in Security and Cryptography for Networks
    Conference paper 2022
  20. Probabilistic root finding in code-based cryptography

    Probabilistic algorithms for finding roots of polynomials have not been applied to code-based cryptography before. One obstacle is their non-constant...

    Dúnia Marchiori, Ricardo Custódio, ... Lucia Moura in Journal of Cryptographic Engineering
    Article 31 July 2023
Did you find what you were looking for? Share feedback.