2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T) 2017
DOI: 10.1109/infocommst.2017.8246365
|View full text |Cite
|
Sign up to set email alerts
|

Code-based public-key cryptosystems for the post-quantum period

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
7
0
7

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 41 publications
(14 citation statements)
references
References 37 publications
0
7
0
7
Order By: Relevance
“…These results may also be useful in other important practical applications: cryptography, authentication, the theory of complex signals, etc. [14][15][16].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…These results may also be useful in other important practical applications: cryptography, authentication, the theory of complex signals, etc. [14][15][16].…”
Section: Discussionmentioning
confidence: 99%
“…α16 , α 32 ,(63, 36,11) α3 , α6 , α12 , α 24 , α 48 , α 33 ,α 5 , α 10 , α 20 , α 40 , α 17 , α 34 , α 7 , α 14 , α 28 , α 56 , α 49 , α 35 , α 9 , α 18 , α 36 GF (2 7 ) α 1 , α 2 , α 4 , α 8 , α 16 , α 32 , α 64 , (127, 64, 21) α 3 , α 6 , α 12 , α 24 , α 48 , α 96 , α 65 , α 5 , α 10 , α 20 , α 40 , α 80 , α 33 , α 66 , α 7 , α14 , α 28 , α 56 , α 112 , α 97 , α 67 , α 9 , α 18 , α 36 , α 72 , α 17 , α 34 , α 68 , α 11 , α 22 , α 44 , α 88 , α 49 , α 98 , α 69 , α 13 , α 26 , α 52 , α 104 , α 81 , α 35 , α 70 , α 15 , α 30 , α 60 , α 120 , α 113 , α 99 , α 71 , α 19 , α 38 , α 76 , α 25 , α 50 , α 100 , α 73 Primitive binary BCH-code.…”
unclassified
“…The constant-weight codes are also useful to perform the operation of code-based cryptosystems [9][10][11][12][13][14][15][16][17][18]. In particular, they are used in McEliece [9] and Niederreiter [10] public key encryption systems, as well as in electronic signature schemes [13,14] and pseudo-random number generators [11,12].…”
Section: Introductionmentioning
confidence: 99%
“…There are two major classes of methods to replace traditional cryptographythe first one is quantum cryptography (QC) [1], based on the fundamental difference, the use of the unique capabilities of quantum mechanics; the second is post-quantum cryptography (PQC) [2], based on the more complicated mathematical problems (for example, lattice-based cryptosystems, syndrome-based cryptosystems and others).…”
Section: Introductionmentioning
confidence: 99%