Journal articles on the topic 'Cryptosystème de McEliece'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cryptosystème de McEliece.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Fujita, Hachiro. "Quantum McEliece public-key cryptosystem." Quantum Information and Computation 12, no. 3&4 (March 2012): 181–203. http://dx.doi.org/10.26421/qic12.3-4-1.
Full textKosolapov, Yury V., and Aleksey N. Shigaev. "The Support Splitting Algorithm for Induced Codes." Modeling and Analysis of Information Systems 25, no. 3 (June 30, 2018): 276–90. http://dx.doi.org/10.18255/1818-1015-2018-3-276-290.
Full textRatseev, S. M., O. I. Cherevatenko, and V. A. Chernyavskaya. "ON SOME CRYPTOSYSTEMS BASED ON ALGEBRAIC CODES." Vestnik of Samara University. Natural Science Series 27, no. 1 (November 29, 2021): 62–73. http://dx.doi.org/10.18287/2541-7525-2021-27-1-62-73.
Full textKosolapov, Yuri V., and Evgeny A. Lelyuk. "On the structural security of a McEliece-type cryptosystem based on the sum of tensor products of binary Reed - Muller codes." Prikladnaya Diskretnaya Matematika, no. 57 (2022): 22–39. http://dx.doi.org/10.17223/20710410/57/2.
Full textUkwuoma, Henry Chima, Gabriel Arome, Aderonke Thompson, and Boniface Kayode Alese. "Post-quantum cryptography-driven security framework for cloud computing." Open Computer Science 12, no. 1 (January 1, 2022): 142–53. http://dx.doi.org/10.1515/comp-2022-0235.
Full textCalkavur, Selda. "Some Public-key Cryptosystems Over Finite Fields." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 19 (April 26, 2022): 99–104. http://dx.doi.org/10.37394/23209.2022.19.10.
Full textCalkavur, Selda. "Some Public-key Cryptosystems Over Finite Fields." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 19 (April 26, 2022): 99–104. http://dx.doi.org/10.37394/23209.2022.19.10.
Full textAlekseychuk, Anton, and Olha Shevchuk. "A necessary condition for CPA-security of randomized symmetric code cryptosystems." Physico-mathematical modelling and informational technologies, no. 33 (September 3, 2021): 78–82. http://dx.doi.org/10.15407/fmmit2021.33.078.
Full textKuznetsov, А. А., Y. І. Gorbenko, A. S. Kiian, А. А. Uvarova, and T. Y. Kuznetsova. "Comparative studies and analysis of efficiency code-based hybrid cryptosystem." Radiotekhnika, no. 195 (December 28, 2018): 61–69. http://dx.doi.org/10.30837/rt.2018.4.195.07.
Full textRashwan, Haitham, Ernst M. Gabidulin, Bahram Honary, and Haitham Cruickshank. "Enhancing the Security of the GPT Cryptosystem Against Attacks." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 4 (October 15, 2013): 2457–75. http://dx.doi.org/10.24297/ijct.v11i4.3130.
Full textPark, ByeongGyu, Suhri Kim, Seokhie Hong, HeeSeok Kim, and Seog Chung Seo. "Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages." Applied Sciences 10, no. 5 (March 6, 2020): 1831. http://dx.doi.org/10.3390/app10051831.
Full textLiu, Si Min, and Jun Yao Ye. "The Improved McEliece PKC and its Security Analysis." Advanced Materials Research 962-965 (June 2014): 2814–17. http://dx.doi.org/10.4028/www.scientific.net/amr.962-965.2814.
Full textRepka, Marek, and Pavol Zajac. "Overview of the Mceliece Cryptosystem and its Security." Tatra Mountains Mathematical Publications 60, no. 1 (September 1, 2014): 57–83. http://dx.doi.org/10.2478/tmmp-2014-0025.
Full textLiu, Xiangxin, Xiaoyuan Yang, Yiliang Han, and Xu An Wang. "A Secure and Efficient Code-Based Signature Scheme." International Journal of Foundations of Computer Science 30, no. 04 (June 2019): 635–45. http://dx.doi.org/10.1142/s0129054119400173.
Full textFabšič, Tomáš, Ondrej Gallo, and Viliam Hromada. "Simple Power Analysis Attack on the QC-LDPC McEliece Cryptosystem." Tatra Mountains Mathematical Publications 67, no. 1 (September 1, 2016): 85–92. http://dx.doi.org/10.1515/tmmp-2016-0032.
Full textThiers, Johann-Philipp, and Jürgen Freudenberger. "Generalized Concatenated Codes over Gaussian and Eisenstein Integers for Code-Based Cryptography." Cryptography 5, no. 4 (November 29, 2021): 33. http://dx.doi.org/10.3390/cryptography5040033.
Full textMOHAMMED, Hayder Abdulkudhur, and Najlae Falah Hameed Al SAFFAR. "MSB BASED IMAGE STEGANOGRAPHY USING MCELIECE CRYPTOSYSTEM." MINAR International Journal of Applied Sciences and Technology 03, no. 03 (September 1, 2021): 31–40. http://dx.doi.org/10.47832/2717-8234.3-3.5.
Full textDömösi, Pál, Carolin Hannusch, and Géza Horváth. "A Cryptographic System Based on a New Class of Binary Error-Correcting Codes." Tatra Mountains Mathematical Publications 73, no. 1 (August 1, 2019): 83–96. http://dx.doi.org/10.2478/tmmp-2019-0007.
Full textIlanthenral, K., and K. S. Easwarakumar. "Hexi McEliece Public Key Cryptosystem." Applied Mathematics & Information Sciences 8, no. 5 (September 1, 2014): 2595–603. http://dx.doi.org/10.12785/amis/080559.
Full textLutsenko, M. S. "Post-quantum algorithm of Classic McEliece key encapsulation." Radiotekhnika, no. 203 (December 23, 2020): 82–90. http://dx.doi.org/10.30837/rt.2020.4.203.06.
Full textFreudenberger, Jürgen, and Johann-Philipp Thiers. "A New Class of Q-Ary Codes for the McEliece Cryptosystem." Cryptography 5, no. 1 (March 15, 2021): 11. http://dx.doi.org/10.3390/cryptography5010011.
Full textLeclerc, Matthias. "An implementation of the McEliece-cryptosystem." ACM SIGSAC Review 9, no. 2 (April 1991): 1–4. http://dx.doi.org/10.1145/127039.127041.
Full textTentu, Appala Naidu, Ajeet Singh, Rakesh Kumar, and Allu Swamy Naidu. "McEliece cryptosystem: simulation and security vulnerabilities." International Journal of Computing Science and Mathematics 12, no. 1 (2020): 64. http://dx.doi.org/10.1504/ijcsm.2020.10030822.
Full textKumar, Rakesh, Allu Swamy Naidu, Ajeet Singh, and Appala Naidu Tentu. "McEliece cryptosystem: simulation and security vulnerabilities." International Journal of Computing Science and Mathematics 12, no. 1 (2020): 64. http://dx.doi.org/10.1504/ijcsm.2020.108787.
Full textAbdulrazaq, Newroz N., and Thuraya M. Qaradaghi. "Evaluation Study of Original McEliece Cryptosystem Against Side Channel Attack." Journal of Zankoy Sulaimani - Part A 18, no. 4 (July 31, 2016): 231–40. http://dx.doi.org/10.17656/jzs.10579.
Full textMarek, Repka. "McEliece PKC Calculator." Journal of Electrical Engineering 65, no. 6 (January 31, 2015): 342–48. http://dx.doi.org/10.2478/jee-2014-0056.
Full textDavydov, V. V., V. V. Beliaev, E. F. Kustov, A. G. Leevik, and S. V. Bezzateev. "Modern variations of McEliece and Niederreiter cryptosystems." Scientific and Technical Journal of Information Technologies, Mechanics and Optics 22, no. 2 (April 1, 2022): 324–31. http://dx.doi.org/10.17586/2226-1494-2022-22-2-324-331.
Full textFaugere, Jean-Charles, Valerie Gauthier-Umana, Ayoub Otmani, Ludovic Perret, and Jean-Pierre Tillich. "A Distinguisher for High-Rate McEliece Cryptosystems." IEEE Transactions on Information Theory 59, no. 10 (October 2013): 6830–44. http://dx.doi.org/10.1109/tit.2013.2272036.
Full textLee, Wijik, Jong-Seon No, and Young-Sik Kim. "Punctured Reed–Muller code-based McEliece cryptosystems." IET Communications 11, no. 10 (July 13, 2017): 1543–48. http://dx.doi.org/10.1049/iet-com.2016.1268.
Full textNiebuhr, Robert, Mohammed Meziani, Stanislav Bulygin, and Johannes Buchmann. "Selecting parameters for secure McEliece-based cryptosystems." International Journal of Information Security 11, no. 3 (January 5, 2012): 137–47. http://dx.doi.org/10.1007/s10207-011-0153-2.
Full textOvchinnikov, Andrey. "The variant of post-quantum cryptosystem based on burst-correcting codes and on the complete decoding problem." Information and Control Systems, no. 3 (June 24, 2022): 45–54. http://dx.doi.org/10.31799/1684-8853-2022-3-45-54.
Full textLoidreau, P., and N. Sendrier. "Weak keys in the McEliece public-key cryptosystem." IEEE Transactions on Information Theory 47, no. 3 (March 2001): 1207–11. http://dx.doi.org/10.1109/18.915687.
Full textChizhov, I. V. "The key space of the McEliece–Sidelnikov cryptosystem." Discrete Mathematics and Applications 19, no. 5 (January 2009): 445–74. http://dx.doi.org/10.1515/dma.2009.031.
Full textHung-Min Sun. "Further cryptanalysis of the McEliece public-key cryptosystem." IEEE Communications Letters 4, no. 1 (January 2000): 18–19. http://dx.doi.org/10.1109/4234.823536.
Full textDottling, Nico, Rafael Dowsley, Jörn Muller-Quade, and Anderson C. A. Nascimento. "A CCA2 Secure Variant of the McEliece Cryptosystem." IEEE Transactions on Information Theory 58, no. 10 (October 2012): 6672–80. http://dx.doi.org/10.1109/tit.2012.2203582.
Full textBaldi, Marco, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, and Davide Schipani. "Enhanced Public Key Security for the McEliece Cryptosystem." Journal of Cryptology 29, no. 1 (August 15, 2014): 1–27. http://dx.doi.org/10.1007/s00145-014-9187-8.
Full textNojima, Ryo, Hideki Imai, Kazukuni Kobara, and Kirill Morozov. "Semantic security for the McEliece cryptosystem without random oracles." Designs, Codes and Cryptography 49, no. 1-3 (March 6, 2008): 289–305. http://dx.doi.org/10.1007/s10623-008-9175-9.
Full textAl Jabri, A. Kh. "A symmetric version of the McEliece public-key cryptosystem." International Journal of Network Management 7, no. 6 (November 1997): 316–23. http://dx.doi.org/10.1002/(sici)1099-1190(199711/12)7:6<316::aid-nem261>3.0.co;2-7.
Full textFallnich, Daniel, Christian Lanius, Shutao Zhang, and Tobias Gemmeke. "Efficient ASIC Architecture for Low Latency Classic McEliece Decoding." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 2 (March 12, 2024): 403–25. http://dx.doi.org/10.46586/tches.v2024.i2.403-425.
Full textLau, Terry Shue Chien, and Chik How Tan. "On the design and security of Lee metric McEliece cryptosystems." Designs, Codes and Cryptography 90, no. 3 (January 18, 2022): 695–717. http://dx.doi.org/10.1007/s10623-021-01002-2.
Full textOtmani, Ayoub, Jean-Pierre Tillich, and Léonard Dallot. "Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes." Mathematics in Computer Science 3, no. 2 (January 12, 2010): 129–40. http://dx.doi.org/10.1007/s11786-009-0015-8.
Full textChizhov, I. V. "The number of public keys in the McEliece-Sidel’nikov cryptosystem." Moscow University Computational Mathematics and Cybernetics 33, no. 3 (September 2009): 151–57. http://dx.doi.org/10.3103/s0278641909030066.
Full textШевчук, О. С. "Randomized symmetric McEliece cryptosystem based on generalized Reed-Solomon codes." Radiotekhnika 1, no. 200 (April 30, 2020): 25–36. http://dx.doi.org/10.30837/rt.2020.1.200.03.
Full textLim, Seongan, Hyang-Sook Lee, and Mijin Choi. "An Efficient Decoding of Goppa Codes for the McEliece Cryptosystem." Fundamenta Informaticae 133, no. 4 (2014): 387–97. http://dx.doi.org/10.3233/fi-2014-1082.
Full textZajac, Pavol. "Hybrid Encryption from McEliece Cryptosystem with Pseudo-random Error Vector." Fundamenta Informaticae 169, no. 4 (October 10, 2019): 345–60. http://dx.doi.org/10.3233/fi-2019-1851.
Full textSokolova, A. A. "Application of edge local complementation to McEliece cryptosystem structural analysis." Prikladnaya diskretnaya matematika. Prilozhenie, no. 10 (September 1, 2017): 142–44. http://dx.doi.org/10.17223/2226308x/10/56.
Full textChen, Cong, Thomas Eisenbarth, Ingo von Maurich, and Rainer Steinwandt. "Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem." IEEE Transactions on Information Forensics and Security 11, no. 6 (June 2016): 1093–105. http://dx.doi.org/10.1109/tifs.2015.2509944.
Full textShoufan, Abdulhadi, Thorsten Wink, H. Gregor Molter, Sorin A. Huss, and Eike Kohnert. "A Novel Cryptoprocessor Architecture for the McEliece Public-Key Cryptosystem." IEEE Transactions on Computers 59, no. 11 (November 2010): 1533–46. http://dx.doi.org/10.1109/tc.2010.115.
Full textSun, Zhe, Jincheng Zhuang, Zimeng Zhou, and Fang-Wei Fu. "A new McEliece-type cryptosystem using Gabidulin-Kronecker product codes." Theoretical Computer Science 994 (May 2024): 114480. http://dx.doi.org/10.1016/j.tcs.2024.114480.
Full textWang, Zexi, Minqing Zhang, Yongjun Kong, Yan Ke, and Fuqiang Di. "Noise Modulation-Based Reversible Data Hiding with McEliece Encryption." Security and Communication Networks 2022 (October 30, 2022): 1–14. http://dx.doi.org/10.1155/2022/4671799.
Full text