2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI) 2017
DOI: 10.1109/mcsi.2017.31
|View full text |Cite
|
Sign up to set email alerts
|

McEliece and Niederreiter Cryptosystems Analysis in the Context of Post-Quantum Network Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(11 citation statements)
references
References 13 publications
0
11
0
Order By: Relevance
“…The first probabilistic cipher was developed by Robert McEliece in 1978 [3]. The algorithm is based on binary linear codes and linear algebra over GF (2). The key pair generation includes the following actions [3]: 1) A binary linear (n, k)-code С with k × n generator matrix G is chosen at random.…”
Section: The Mceliece Ciphermentioning
confidence: 99%
See 4 more Smart Citations
“…The first probabilistic cipher was developed by Robert McEliece in 1978 [3]. The algorithm is based on binary linear codes and linear algebra over GF (2). The key pair generation includes the following actions [3]: 1) A binary linear (n, k)-code С with k × n generator matrix G is chosen at random.…”
Section: The Mceliece Ciphermentioning
confidence: 99%
“…The algorithm is suitable for digital signature applications [5], but the computational effort required for signature generation is larger compared to other quantum safe algorithms [1]. Similarly to the McEliece cipher, this cipher also employs linear algebra over GF (2) and binary linear codes.…”
Section: The Niederreiter Ciphermentioning
confidence: 99%
See 3 more Smart Citations