搜索结果: 1-6 共查到“军队指挥学 Niederreiter”相关记录6条 . 查询时间(0.056 秒)
FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes
post-quantum cryptography code-based cryptography Niederreiter cryptosystem
2017/12/11
This paper presents an FPGA implementation of the Niederreiter cryptosystem using binary Goppa codes, including modules for encryption, decryption, and key generation. We improve over previous impleme...
FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes
post-quantum cryptography code-based cryptography Niederreiter key generation
2017/6/22
This paper presents an post-quantum secure, efficient, and tunable FPGA implementation of the key generation algorithm for the Niederreiter cryptosystem using binary Goppa codes. Our key generator imp...
An Application Specific Instruction Set Processor (ASIP) for the Niederreiter Cryptosystem
Cryptographic hardware and implementation Application Specific Instruction Set Processor Niederreiter cryptosystem
2015/12/18
The Niederreiter public-key cryptosystem is based
on the security assumption that decoding generic linear binary
codes is NP complete, and therefore, is regarded as an alternative
post-quantum solu...
Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems
post-quantum cryptography McEliece Niederreiter side-channel attacks
2010/9/14
Research within “post-quantum” cryptography has focused on development of schemes that resist quantum cryptanalysis. However, if such schemes are to be deployed, practical questions of efficiency...
Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes
Public key cryptography McEliece encryption Niederreiter encryption
2009/9/27
In this paper a new structural attack on the McEliece/Niederreiter
public key cryptosystem based on subcodes of generalized Reed-
Solomon codes proposed by Berger and Loidreau is described. It allow...
Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes
Public key cryptography McEliece encryption Niederreiter encryption
2009/9/22
In this paper a new structural attack on the McEliece/Niederreiter
public key cryptosystem based on subcodes of generalized Reed-
Solomon codes proposed by Berger and Loidreau is described. It allow...