Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A distinguisher for high-rate McEliece cryptosystems
JC Faugere, V Gauthier-Umana… - IEEE Transactions …, 2013 - ieeexplore.ieee.org
The Goppa Code Distinguishing (GD) problem consists in distinguishing the matrix of a
Goppa code from a random matrix. The hardness of this problem is an assumption to prove …
Goppa code from a random matrix. The hardness of this problem is an assumption to prove …
Strongly secure authenticated key exchange from factoring, codes, and lattices
An unresolved problem in research on authenticated key exchange (AKE) in the public-key
setting is to construct a secure protocol against advanced attacks such as key compromise …
setting is to construct a secure protocol against advanced attacks such as key compromise …
Enhanced public key security for the McEliece cryptosystem
This paper studies a variant of the McEliece cryptosystem able to ensure that the code used
as the public key is no longer permutation equivalent to the secret code. This increases the …
as the public key is no longer permutation equivalent to the secret code. This increases the …
Chosen-ciphertext security via correlated products
We initiate the study of one-wayness under correlated products. We are interested in
identifying necessary and sufficient conditions for a function f and a distribution on inputs (x …
identifying necessary and sufficient conditions for a function f and a distribution on inputs (x …
More constructions of lossy and correlation-secure trapdoor functions
We propose new and improved instantiations of lossy trapdoor functions (Peikert and
Waters, STOC'08), and correlation-secure trapdoor functions (Rosen and Segev, TCC'09) …
Waters, STOC'08), and correlation-secure trapdoor functions (Rosen and Segev, TCC'09) …
IND-CCA secure cryptography based on a variant of the LPN problem
Abstract In 2003 Michael Alekhnovich (FOCS 2003) introduced a novel variant of the
learning parity with noise problem and showed that it implies IND-CPA secure public-key …
learning parity with noise problem and showed that it implies IND-CPA secure public-key …
A framework for efficient adaptively secure composable oblivious transfer in the ROM
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of
applications, in particular, as an essential building block for two-party and multi-party …
applications, in particular, as an essential building block for two-party and multi-party …
Coding-based hybrid post-quantum cryptosystem for non-uniform information
S Tarnopolsky, A Cohen - 2024 IEEE International Symposium …, 2024 - ieeexplore.ieee.org
We introduce for non-uniform messages a novel hybrid universal network coding
cryptosystem (NU-HUNCC) in the finite blocklength regime that provides Post-Quantum (PQ) …
cryptosystem (NU-HUNCC) in the finite blocklength regime that provides Post-Quantum (PQ) …
[PDF][PDF] Challenges and opportunities of cloud computing
In recent years, Cloud Computing has become an emerging technology that gains wide
influence on IT systems. Cloud Computing is a distributed computing model for enabling …
influence on IT systems. Cloud Computing is a distributed computing model for enabling …
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism
This paper discusses how to realize practical post-quantum authenticated key exchange
(AKE) with strong security, ie, CK+ security (Krawczyk, CRYPTO 2005). It is known that …
(AKE) with strong security, ie, CK+ security (Krawczyk, CRYPTO 2005). It is known that …