Academic literature on the topic 'Coding-based cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Coding-based cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Coding-based cryptography"
Hammad, Baraa Tareq, Ali Maki Sagheer, Ismail Taha Ahmed, and Norziana Jamil. "A comparative review on symmetric and asymmetric DNA-based cryptography." Bulletin of Electrical Engineering and Informatics 9, no. 6 (2020): 2484–91. http://dx.doi.org/10.11591/eei.v9i6.2470.
Full textBaraa, Tareq Hammad, Maki Sagheer Ali, Taha Ahmed Ismail, and Jamil Norziana. "A comparative review on symmetric and asymmetric DNA-based cryptography." Bulletin of Electrical Engineering and Informatics 9, no. 6 (2020): 2484–91. https://doi.org/10.11591/eei.v9i6.2470.
Full textCohen, Alejandro, Rafael G. L. D'Oliveira, Salman Salamatian, and Muriel Medard. "Network Coding-Based Post-Quantum Cryptography." IEEE Journal on Selected Areas in Information Theory 2, no. 1 (2021): 49–64. http://dx.doi.org/10.1109/jsait.2021.3054598.
Full textLada, Nataliia, and Yuliia Rudnytska. "IMPLEMENTATION OF A METHOD FOR SYNTHESIZING GROUPS OF SYMMETRIC DOUBLE-OPERAND OPERATIONS OF CRYPTOGRAPHIC INFORMATION CODING FOR BLOCK ENCRYPTION SYSTEMS." Innovative Technologies and Scientific Solutions for Industries, no. 2 (20) (June 30, 2022): 35–43. http://dx.doi.org/10.30837/itssi.2022.20.035.
Full textBhandari, Ashok Singh. "Analysis of Computational Algebra for Cryptography and Coding Theory Applications." Mathematical Statistician and Engineering Applications 70, no. 1 (2021): 598–606. http://dx.doi.org/10.17762/msea.v70i1.2513.
Full textMolotkov, S. N. "Multiplex quantum cryptography based on time coding without interferometers." Journal of Experimental and Theoretical Physics Letters 79, no. 9 (2004): 445–49. http://dx.doi.org/10.1134/1.1776241.
Full textLiu, Jingang, Yongge Wang, Zongxiang Yi, and Zhiqiang Lin. "polarRLCE: A New Code-Based Cryptosystem Using Polar Codes." Security and Communication Networks 2019 (December 26, 2019): 1–10. http://dx.doi.org/10.1155/2019/3086975.
Full textMalaina, Iker, Javier Gutiérrez, Leire Legarreta, Iraide Mardones, and Luís Martínez. "Problem-Based Teaching through Video Podcasts for Coding and Cryptography." Proceedings 2, no. 21 (2018): 1336. http://dx.doi.org/10.3390/proceedings2211336.
Full textHu, Jingwei, Ray C. C. Cheung, and Tim Guneysu. "Compact Constant Weight Coding Engines for the Code-Based Cryptography." IEEE Transactions on Circuits and Systems II: Express Briefs 64, no. 9 (2017): 1092–96. http://dx.doi.org/10.1109/tcsii.2017.2675449.
Full textKAYMAK, Öznur. "Coding theory for h(x)-Fibonacci polynomials." Balıkesir Üniversitesi Fen Bilimleri Enstitüsü Dergisi 26, no. 1 (2024): 226–36. http://dx.doi.org/10.25092/baunfbed.1347379.
Full textDissertations / Theses on the topic "Coding-based cryptography"
Thorpe, Christopher. "Compression aided feature based steganalysis of perturbed quantization steganography in JPEG images." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 114 p, 2008. http://proquest.umi.com/pqdweb?did=1459914021&sid=6&Fmt=2&clientId=8331&RQT=309&VName=PQD.
Full textRalaivaosaona, Tanjona Fiononana. "On the effciency of code-based steganography." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96997.
Full textDyseryn-Fostier, Victor. "Exploring the multi-dimensional approach in code-based cryptography." Electronic Thesis or Diss., Limoges, 2024. http://www.theses.fr/2024LIMO0007.
Full textOverbeck, Raphael. "Public Key Cryptography based on Coding Theory." Phd thesis, 2007. https://tuprints.ulb.tu-darmstadt.de/823/1/Overbeck_Dissertation_ULB.pdf.
Full textOverbeck, Raphael [Verfasser]. "Public key cryptography based on coding theory / von Raphael Overbeck." 2007. http://d-nb.info/984611118/34.
Full textAgrawal, Shweta Prem. "Efficient, provably secure code constructions." Thesis, 2011. http://hdl.handle.net/2152/ETD-UT-2011-05-2675.
Full textAlmeida, Ana Catarina Miranda. "Development of a platform for generation of icon-based graphic codes." Master's thesis, 2020. http://hdl.handle.net/10316/92541.
Full textBooks on the topic "Coding-based cryptography"
Henry, Beker, Piper Fred, and Institute of Mathematics and its Applications., eds. Cryptography and coding: Based on the proceedings of a conference organized by The Institute of Mathematics and its Applications on cryptography and coding, held at the Royal Agricultural College, Cirencester on 15th-17th December 1986. Clarendon, 1989.
Find full text1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Springer Science+Business Media, LLC, 2011.
Find full textInternational Conference on Pairing-Based Cryptography (4th 2010 Yamanaka, Japan). Pairing-based cryptography - pairing 2010: 4th international conference, Yamanaka Hot Spring, Japan, December 13-15, 2010 : proceedings. Springer, 2010.
Find full textCryptography and coding III: Based on the proceedings of a conference organized by the Institute ofMathematics and Its Applications on Cryptography and Coding, held at the Royal Agricultural College, Cirencester in December 1991. Clarendon Press, 1993.
Find full textBook chapters on the topic "Coding-based cryptography"
Cai, Canhui, and Jing Chen. "Tessellation Based Multiple Description Coding." In Cryptography and Coding. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11586821_6.
Full textBranco, Pedro, and Paulo Mateus. "A Traceable Ring Signature Scheme Based on Coding Theory." In Post-Quantum Cryptography. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25510-7_21.
Full textAgrawal, Shweta, and Dan Boneh. "Homomorphic MACs: MAC-Based Integrity for Network Coding." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01957-9_18.
Full textAguilar Melchor, Carlos, Pierre-Louis Cayrel, and Philippe Gaborit. "A New Efficient Threshold Ring Signature Scheme Based on Coding Theory." In Post-Quantum Cryptography. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88403-3_1.
Full textDeneuville, Jean-Christophe, Philippe Gaborit, and Gilles Zémor. "Ouroboros: A Simple, Secure and Efficient Key Exchange Protocol Based on Coding Theory." In Post-Quantum Cryptography. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59879-6_2.
Full textBerger, Thierry P., Cheikh Thiécoumba Gueye, and Jean Belo Klamti. "A NP-Complete Problem in Coding Theory with Application to Code Based Cryptography." In Codes, Cryptology and Information Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55589-8_15.
Full textAlbrecht, Martin R., and Kenneth G. Paterson. "Breaking an Identity-Based Encryption Scheme Based on DHIES." In Cryptography and Coding. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25516-8_21.
Full textCocks, Clifford. "An Identity Based Encryption Scheme Based on Quadratic Residues." In Cryptography and Coding. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45325-3_32.
Full textVergnaud, Damien. "RSA-Based Secret Handshakes." In Coding and Cryptography. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11779360_21.
Full textCong, Kelong, Karim Eldefrawy, and Nigel P. Smart. "Optimizing Registration Based Encryption." In Cryptography and Coding. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92641-0_7.
Full textConference papers on the topic "Coding-based cryptography"
Thammasith, Phetphachan, Trung Hieu Nguyen, and Hieu Minh Nguyen. "Secure Network Coding Based on the Integer Factorization Problem." In 2024 1st International Conference On Cryptography And Information Security (VCRIS). IEEE, 2024. https://doi.org/10.1109/vcris63677.2024.10813435.
Full textVan Linh, Dinh, Nguyen Tuan Anh, Dang Thi Thu Huong, Hoang Thi Phuong Thao, and Vu Van Yem. "Crypto-Coding Method Based on the Components of Turbo Code." In 2024 1st International Conference On Cryptography And Information Security (VCRIS). IEEE, 2024. https://doi.org/10.1109/vcris63677.2024.10813438.
Full textCohen, Alejandro, and Rafael G. L. D'Oliveira. "Network Coding-Based Post-Quantum Cryptography for Multi-Users with Different Security Permissions." In 2024 IEEE International Symposium on Information Theory (ISIT). IEEE, 2024. http://dx.doi.org/10.1109/isit57864.2024.10619165.
Full textPercival, Nathan, Pranathi Rayavaram, Sashank Narain, and Claire Seungeun Lee. "CryptoScratch: Teaching Cryptography with Block-based Coding." In SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education. ACM, 2022. http://dx.doi.org/10.1145/3478432.3499067.
Full textKrupa, K., A. Tonello, S. Boscolo, et al. "Radio-frequency spectrum coding in ultra-long fibre laser based cryptography." In 2015 17th International Conference on Transparent Optical Networks (ICTON). IEEE, 2015. http://dx.doi.org/10.1109/icton.2015.7193390.
Full textLin, Wei-Jian, and Jui-Cheng Yen. "An integrating channel coding and cryptography design for OFDM based WLANs." In 2009 IEEE 13th International Symposium on Consumer Electronics (ISCE). IEEE, 2009. http://dx.doi.org/10.1109/isce.2009.5156995.
Full text"LOW COMPLEXITY, LOW DELAY AND SCALABLE AUDIO CODING SCHEME BASED ON A NOVEL STATISTICAL PERCEPTUAL QUANTIZATION PROCEDURE." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2007. http://dx.doi.org/10.5220/0002140100310034.
Full textSinaie, Mahnaz, and Vahid TabaTaba Vakili. "A low complexity joint compression-error detection-cryptography based on arithmetic coding." In 2010 10th International Conference on Information Sciences, Signal Processing and their Applications (ISSPA). IEEE, 2010. http://dx.doi.org/10.1109/isspa.2010.5605483.
Full textCao, Puquan, Yanwei Zhu, and Luozhi Zhang. "IMAGE ENCRYPTION ALGORITHM BASED ON WIDELY CHAOTIC 5D SYSTEMS AND DNA CODING." In CNSCT 2025: 2025 4th International Conference on Cryptography, Network Security and Communication Technology. ACM, 2025. https://doi.org/10.1145/3723890.3723897.
Full textWieschebrink, Christian. "Two NP-complete Problems in Coding Theory with an Application in Code Based Cryptography." In 2006 IEEE International Symposium on Information Theory. IEEE, 2006. http://dx.doi.org/10.1109/isit.2006.261651.
Full text