Academic literature on the topic 'Coding-based cryptography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Coding-based cryptography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Coding-based cryptography"

1

Hammad, Baraa Tareq, Ali Maki Sagheer, Ismail Taha Ahmed, and Norziana Jamil. "A comparative review on symmetric and asymmetric DNA-based cryptography." Bulletin of Electrical Engineering and Informatics 9, no. 6 (2020): 2484–91. http://dx.doi.org/10.11591/eei.v9i6.2470.

Full text
Abstract:
Current researchers have focused on DNA-based cryptography, in fact, DNA or deoxyribonucleic acid, has been applied in cryptography for performing computation as well as storing and transmitting information. In the present work, we made use of DNA in cryptographic, i.e. its storing capabilities (superior information density) and parallelism, in order to improve other classical cryptographic algorithms. Data encryption is made possible via DNA sequences. In this paper, two cases utilizing different DNA properties were studied by combining the DNA codes with those conventional cryptography algor
APA, Harvard, Vancouver, ISO, and other styles
2

Baraa, Tareq Hammad, Maki Sagheer Ali, Taha Ahmed Ismail, and Jamil Norziana. "A comparative review on symmetric and asymmetric DNA-based cryptography." Bulletin of Electrical Engineering and Informatics 9, no. 6 (2020): 2484–91. https://doi.org/10.11591/eei.v9i6.2470.

Full text
Abstract:
Current researchers have focused on DNA-based cryptography, in fact, DNA or deoxyribonucleic acid, has been applied in cryptography for performing computation as well as storing and transmitting information. In the present work, we made use of DNA in cryptographic, i.e. its storing capabilities (superior information density) and parallelism, in order to improve other classical cryptographic algorithms. Data encryption is made possible via DNA sequences. In this paper, two cases utilizing different DNA properties were studied by combining the DNA codes with those conventional cryptography algor
APA, Harvard, Vancouver, ISO, and other styles
3

Cohen, Alejandro, Rafael G. L. D'Oliveira, Salman Salamatian, and Muriel Medard. "Network Coding-Based Post-Quantum Cryptography." IEEE Journal on Selected Areas in Information Theory 2, no. 1 (2021): 49–64. http://dx.doi.org/10.1109/jsait.2021.3054598.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lada, Nataliia, and Yuliia Rudnytska. "IMPLEMENTATION OF A METHOD FOR SYNTHESIZING GROUPS OF SYMMETRIC DOUBLE-OPERAND OPERATIONS OF CRYPTOGRAPHIC INFORMATION CODING FOR BLOCK ENCRYPTION SYSTEMS." Innovative Technologies and Scientific Solutions for Industries, no. 2 (20) (June 30, 2022): 35–43. http://dx.doi.org/10.30837/itssi.2022.20.035.

Full text
Abstract:
The object of the study is the processes of building groups of symmetric double-operand operations of cryptographic coding of information. The subject of the study are features of the implementation of a generalized method of synthesis groups of symmetric two-operand operations of cryptographic coding information for "lightweight cryptography". The purpose of this work is to investigate the process of building and implementing a method of synthesis of groups of symmetric multibit double-operand operations of information cryptographic coding to provide automation for finding ways to increase th
APA, Harvard, Vancouver, ISO, and other styles
5

Bhandari, Ashok Singh. "Analysis of Computational Algebra for Cryptography and Coding Theory Applications." Mathematical Statistician and Engineering Applications 70, no. 1 (2021): 598–606. http://dx.doi.org/10.17762/msea.v70i1.2513.

Full text
Abstract:
Secure communication is essential in many areas of today's interconnected society, from online commerce to international affairs. The foundation of data security is made up of encryption and decryption algorithms, and effective execution calls for an organised approach rather than a chance procedure. This study analyses several encryption techniques with an emphasis on those that apply algebraic coding theory to cryptography. These algebraic coding theory-based cryptographic systems are particularly significant for the future of data security because, in contrast to many existing systems, they
APA, Harvard, Vancouver, ISO, and other styles
6

Molotkov, S. N. "Multiplex quantum cryptography based on time coding without interferometers." Journal of Experimental and Theoretical Physics Letters 79, no. 9 (2004): 445–49. http://dx.doi.org/10.1134/1.1776241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Jingang, Yongge Wang, Zongxiang Yi, and Zhiqiang Lin. "polarRLCE: A New Code-Based Cryptosystem Using Polar Codes." Security and Communication Networks 2019 (December 26, 2019): 1–10. http://dx.doi.org/10.1155/2019/3086975.

Full text
Abstract:
Security challenges brought about by the upcoming 5G era should be taken seriously. Code-based cryptography leverages difficult problems in coding theory and is one of the main techniques enabling cryptographic primitives in the postquantum scenario. In this work, we propose the first efficient secure scheme based on polar codes (i.e., polarRLCE) which is inspired by the RLCE scheme, a candidate for the NIST postquantum cryptography standardization in the first round. In addition to avoiding some weaknesses of the RLCE scheme, we show that, with the proper choice of parameters, using polar cod
APA, Harvard, Vancouver, ISO, and other styles
8

Malaina, Iker, Javier Gutiérrez, Leire Legarreta, Iraide Mardones, and Luís Martínez. "Problem-Based Teaching through Video Podcasts for Coding and Cryptography." Proceedings 2, no. 21 (2018): 1336. http://dx.doi.org/10.3390/proceedings2211336.

Full text
Abstract:
In this work we present the development and preliminary evaluation of several problem-based video podcasts addressed to students of the subject “Coding and Cryptography”. Specifically, this experiment has been carried out with the students of both the Bachelor’s degree in Mathematics and the Master’s degree of Mathematical Research and Modelling, Statistics and Computation, at the University of the Basque Country (UPV/EHU). Our results suggest that students found these complementary videos helpful for their learning process, indicating that this methodology could be appropriate for subjects tr
APA, Harvard, Vancouver, ISO, and other styles
9

Hu, Jingwei, Ray C. C. Cheung, and Tim Guneysu. "Compact Constant Weight Coding Engines for the Code-Based Cryptography." IEEE Transactions on Circuits and Systems II: Express Briefs 64, no. 9 (2017): 1092–96. http://dx.doi.org/10.1109/tcsii.2017.2675449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

KAYMAK, Öznur. "Coding theory for h(x)-Fibonacci polynomials." Balıkesir Üniversitesi Fen Bilimleri Enstitüsü Dergisi 26, no. 1 (2024): 226–36. http://dx.doi.org/10.25092/baunfbed.1347379.

Full text
Abstract:
The amount of information transmitted over the internet network has dramatically increased with the prevailing of internet use. As a result of this increase, the algorithms used in data encryption methods have gained importance. In this paper, h(x)-Fibonacci coding/decoding method for h(x)-Fibonacci polynomials is introduced. The proposed method is fast because it is based on basic matrix operations, and it is suitable for cryptographic applications because it uses the ASCII character encoding system. For this reason, it differs from the classical algebraic methods in literature. Furthermore,
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Coding-based cryptography"

1

Thorpe, Christopher. "Compression aided feature based steganalysis of perturbed quantization steganography in JPEG images." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 114 p, 2008. http://proquest.umi.com/pqdweb?did=1459914021&sid=6&Fmt=2&clientId=8331&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ralaivaosaona, Tanjona Fiononana. "On the effciency of code-based steganography." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96997.

Full text
Abstract:
Thesis (MSc)--Stellenbosch University, 2015<br>ENGLISH ABSTRACT: Steganography is the art of hiding information inside a data host called the cover. The amount of distortion caused by that embedding can influence the security of the steganographic system. By secrecy we mean the detectability of the existence of the secret in the cover, by parties other than the sender and the intended recipient. Crandall (1998) proposed that coding theory (in particular the notion of covering radius) might be used to minimize embedding distortion in steganography. This thesis provides a study of that suggest
APA, Harvard, Vancouver, ISO, and other styles
3

Dyseryn-Fostier, Victor. "Exploring the multi-dimensional approach in code-based cryptography." Electronic Thesis or Diss., Limoges, 2024. http://www.theses.fr/2024LIMO0007.

Full text
Abstract:
La cryptographie fondée sur les codes est une famille féconde d'algorithmes post-quantiques. Sa sécurité repose principalement sur le problème de décoder des mots bruités dans un code aléatoire, qui est réputé difficile pour un ordinateur classique ainsi que pour un ordinateur quantique. Un des défis de la cryptographie post-quantique est sa large taille de clé publique et de message par rapport à la cryptographie classique. Pour remédier à ce problème, on peut considérer des objets avec une structure cyclique, prenant un espace réduit en mémoire. Cette approche implique cependant de ne plus r
APA, Harvard, Vancouver, ISO, and other styles
4

Overbeck, Raphael. "Public Key Cryptography based on Coding Theory." Phd thesis, 2007. https://tuprints.ulb.tu-darmstadt.de/823/1/Overbeck_Dissertation_ULB.pdf.

Full text
Abstract:
In this thesis we view the statistical decoding algorithm, which tries to solve the general decoding problem as well as the variants of the McEliece cryptosystem based on Gabidulin codes. The first part of the thesis is dedicated to the general concept of public key cryptography on the basis of coding theory and the security of the underlying problems. Thus after presenting the basic principles, we study the proposal of statistical decoding (which can be seen as a variant of iterative decoding). For a given code, the statistical decoding algorithm precomputes many low weight check vectors and
APA, Harvard, Vancouver, ISO, and other styles
5

Overbeck, Raphael [Verfasser]. "Public key cryptography based on coding theory / von Raphael Overbeck." 2007. http://d-nb.info/984611118/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Agrawal, Shweta Prem. "Efficient, provably secure code constructions." Thesis, 2011. http://hdl.handle.net/2152/ETD-UT-2011-05-2675.

Full text
Abstract:
The importance of constructing reliable and efficient methods for securing digital information in the modern world cannot be overstated. The urgency of this need is reflected in mainstream media--newspapers and websites are full of news about critical user information, be it credit card numbers, medical data, or social security information, being compromised and used illegitimately. According to news reports, hackers probe government computer networks millions of times a day, about 9 million Americans have their identities stolen each year and cybercrime costs large American businesses 3.8 mil
APA, Harvard, Vancouver, ISO, and other styles
7

Almeida, Ana Catarina Miranda. "Development of a platform for generation of icon-based graphic codes." Master's thesis, 2020. http://hdl.handle.net/10316/92541.

Full text
Abstract:
Dissertação de Mestrado Integrado em Engenharia Electrotécnica e de Computadores apresentada à Faculdade de Ciências e Tecnologia<br>Códigos Lidos por Máquinas ( Machine-Readable Codes - MRC) têm sido usados para diversas finalidades ao longo dos anos, e abordagens clássicas como o código de barras ou o código QR podem ser vistas frequentemente no nosso dia-a-dia. Contudo, mais recentemente, um novo MRC foi criado com a capacidade de juntar o poder de comunicação dos métodos clássicos com uma melhoria significativa na estética e na capacidade de codificação. Este método é designado por UniQode
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Coding-based cryptography"

1

Henry, Beker, Piper Fred, and Institute of Mathematics and its Applications., eds. Cryptography and coding: Based on the proceedings of a conference organized by The Institute of Mathematics and its Applications on cryptography and coding, held at the Royal Agricultural College, Cirencester on 15th-17th December 1986. Clarendon, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Springer Science+Business Media, LLC, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

International Conference on Pairing-Based Cryptography (4th 2010 Yamanaka, Japan). Pairing-based cryptography - pairing 2010: 4th international conference, Yamanaka Hot Spring, Japan, December 13-15, 2010 : proceedings. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cryptography and coding III: Based on the proceedings of a conference organized by the Institute ofMathematics and Its Applications on Cryptography and Coding, held at the Royal Agricultural College, Cirencester in December 1991. Clarendon Press, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chatterjee, Sanjit, and Palash Sarkar. Identity-Based Encryption. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Coding-based cryptography"

1

Cai, Canhui, and Jing Chen. "Tessellation Based Multiple Description Coding." In Cryptography and Coding. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11586821_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Branco, Pedro, and Paulo Mateus. "A Traceable Ring Signature Scheme Based on Coding Theory." In Post-Quantum Cryptography. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25510-7_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Agrawal, Shweta, and Dan Boneh. "Homomorphic MACs: MAC-Based Integrity for Network Coding." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01957-9_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Aguilar Melchor, Carlos, Pierre-Louis Cayrel, and Philippe Gaborit. "A New Efficient Threshold Ring Signature Scheme Based on Coding Theory." In Post-Quantum Cryptography. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88403-3_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Deneuville, Jean-Christophe, Philippe Gaborit, and Gilles Zémor. "Ouroboros: A Simple, Secure and Efficient Key Exchange Protocol Based on Coding Theory." In Post-Quantum Cryptography. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59879-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Berger, Thierry P., Cheikh Thiécoumba Gueye, and Jean Belo Klamti. "A NP-Complete Problem in Coding Theory with Application to Code Based Cryptography." In Codes, Cryptology and Information Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55589-8_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Albrecht, Martin R., and Kenneth G. Paterson. "Breaking an Identity-Based Encryption Scheme Based on DHIES." In Cryptography and Coding. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25516-8_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cocks, Clifford. "An Identity Based Encryption Scheme Based on Quadratic Residues." In Cryptography and Coding. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45325-3_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Vergnaud, Damien. "RSA-Based Secret Handshakes." In Coding and Cryptography. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11779360_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cong, Kelong, Karim Eldefrawy, and Nigel P. Smart. "Optimizing Registration Based Encryption." In Cryptography and Coding. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92641-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Coding-based cryptography"

1

Thammasith, Phetphachan, Trung Hieu Nguyen, and Hieu Minh Nguyen. "Secure Network Coding Based on the Integer Factorization Problem." In 2024 1st International Conference On Cryptography And Information Security (VCRIS). IEEE, 2024. https://doi.org/10.1109/vcris63677.2024.10813435.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Van Linh, Dinh, Nguyen Tuan Anh, Dang Thi Thu Huong, Hoang Thi Phuong Thao, and Vu Van Yem. "Crypto-Coding Method Based on the Components of Turbo Code." In 2024 1st International Conference On Cryptography And Information Security (VCRIS). IEEE, 2024. https://doi.org/10.1109/vcris63677.2024.10813438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cohen, Alejandro, and Rafael G. L. D'Oliveira. "Network Coding-Based Post-Quantum Cryptography for Multi-Users with Different Security Permissions." In 2024 IEEE International Symposium on Information Theory (ISIT). IEEE, 2024. http://dx.doi.org/10.1109/isit57864.2024.10619165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Percival, Nathan, Pranathi Rayavaram, Sashank Narain, and Claire Seungeun Lee. "CryptoScratch: Teaching Cryptography with Block-based Coding." In SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education. ACM, 2022. http://dx.doi.org/10.1145/3478432.3499067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Krupa, K., A. Tonello, S. Boscolo, et al. "Radio-frequency spectrum coding in ultra-long fibre laser based cryptography." In 2015 17th International Conference on Transparent Optical Networks (ICTON). IEEE, 2015. http://dx.doi.org/10.1109/icton.2015.7193390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lin, Wei-Jian, and Jui-Cheng Yen. "An integrating channel coding and cryptography design for OFDM based WLANs." In 2009 IEEE 13th International Symposium on Consumer Electronics (ISCE). IEEE, 2009. http://dx.doi.org/10.1109/isce.2009.5156995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"LOW COMPLEXITY, LOW DELAY AND SCALABLE AUDIO CODING SCHEME BASED ON A NOVEL STATISTICAL PERCEPTUAL QUANTIZATION PROCEDURE." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2007. http://dx.doi.org/10.5220/0002140100310034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sinaie, Mahnaz, and Vahid TabaTaba Vakili. "A low complexity joint compression-error detection-cryptography based on arithmetic coding." In 2010 10th International Conference on Information Sciences, Signal Processing and their Applications (ISSPA). IEEE, 2010. http://dx.doi.org/10.1109/isspa.2010.5605483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cao, Puquan, Yanwei Zhu, and Luozhi Zhang. "IMAGE ENCRYPTION ALGORITHM BASED ON WIDELY CHAOTIC 5D SYSTEMS AND DNA CODING." In CNSCT 2025: 2025 4th International Conference on Cryptography, Network Security and Communication Technology. ACM, 2025. https://doi.org/10.1145/3723890.3723897.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wieschebrink, Christian. "Two NP-complete Problems in Coding Theory with an Application in Code Based Cryptography." In 2006 IEEE International Symposium on Information Theory. IEEE, 2006. http://dx.doi.org/10.1109/isit.2006.261651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!