2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) 2018
DOI: 10.1109/dessert.2018.8409144
|View full text |Cite
|
Sign up to set email alerts
|

Code-based key encapsulation mechanisms for post-quantum standardization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
3
1

Relationship

4
3

Authors

Journals

citations
Cited by 14 publications
(17 citation statements)
references
References 22 publications
0
16
0
1
Order By: Relevance
“…These results may also be useful in other important practical applications: cryptography, authentication, the theory of complex signals, etc. [14][15][16].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…These results may also be useful in other important practical applications: cryptography, authentication, the theory of complex signals, etc. [14][15][16].…”
Section: Discussionmentioning
confidence: 99%
“…that with i = ξ, it fully complies with the expressions (1-2) for the model with independent errors. To calculate the EGC of (n, k, d)-block code in a channel with grouping errors, it is necessary to fix a required error probability on one character P d and calculate the corresponding value of E/N 0 by expressions (14) and/or (19) (taking into account the introduced redundancy and the multiplier d/n). The difference of γ 2 and γ 1 gives the required estimation of the EGC:…”
Section: No /mentioning
confidence: 99%
“…In order to provide a maximum stability, it is recommended to maximize the Hamming weight of the vector e, because overcoming all possible values of this vector is much more complicated. Decryption in the hybrid scheme occurs, just like in the McEliece scheme described in the previous section, with the only difference that information is extracted not only from the vector I, but also from the error vector e [12][13][14]. This fact allows us to significantly increase the relative speed of information transmission, which will be discussed further.…”
Section: A New Hybrid Cryptosystemmentioning
confidence: 99%
“…An estimation of the relative speed for the McEliece scheme is the simplest, since it is known that any cryptogram formed by this algorithm has the length n, whereas the initial information vector has the length of k bit. Consequently, the relative transmission speed in this case [12][13][14]…”
Section: Relative Speed Of Information Transmissionmentioning
confidence: 99%
See 1 more Smart Citation