2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) 2018
DOI: 10.1109/dessert.2018.8409154
|View full text |Cite
|
Sign up to set email alerts
|

Code-based electronic digital signature

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0
5

Year Published

2019
2019
2020
2020

Publication Types

Select...
3
3
1

Relationship

3
4

Authors

Journals

citations
Cited by 26 publications
(16 citation statements)
references
References 14 publications
0
9
0
5
Order By: Relevance
“…These results may also be useful in other important practical applications: cryptography, authentication, the theory of complex signals, etc. [14][15][16].…”
Section: Discussionmentioning
confidence: 99%
“…These results may also be useful in other important practical applications: cryptography, authentication, the theory of complex signals, etc. [14][15][16].…”
Section: Discussionmentioning
confidence: 99%
“…The information vector is further transformed using equilibrium coding. Upon receiving a message, a legitimate user, in the same way as in McEliece cryptosystem, removes the action of masking matrices and, using the fast decoding algorithm, receives the vector e, which, after equilibrium coding, represents the initially transmitted information [11].…”
Section: Niederreiter Cryptosystemmentioning
confidence: 99%
“…A basis of the proposed system is the combination of encryption information according to McEliece and Niederreiter schemes. Private keys of the hybrid scheme are similar to the first two schemes, matrix X (it has k k  elements), matrix P (it has n n  elements) and, in the case of nonbinary coding, matrix D (size n n  ) [7,11].…”
Section: A New Hybrid Cryptosystemmentioning
confidence: 99%
See 2 more Smart Citations