LEDAkem: A post-quantum key encapsulation mechanism based on QC-LDPC codes

M Baldi, A Barenghi, F Chiaraluce, G Pelosi… - … Conference on Post …, 2018 - Springer
This work presents a new code-based key encapsulation mechanism (KEM) called
LEDAkem. It is built on the Niederreiter cryptosystem and relies on quasi-cyclic low-density …

A privacy-preserving code-based authentication protocol for Internet of Things

N Chikouche, PL Cayrel, EHM Mboup… - The Journal of …, 2019 - Springer
Abstract The Internet of Things (IoT) is an upcoming technology that permits to interconnect
different devices and machines using heterogeneous networks. One of the most critical …

On the Development and Standardisation of Post-Quantum Cryptography-A Synopsis of the NIST Post-Quantum Cryptography Standardisation Process, its Incentives …

MW Legernaes - 2018 - ntnuopen.ntnu.no
Due to developments within the field of quantum computers, the need for develo** and
implementing quantum-resistant cryptographic algorithms has become more urgent. Using …

A code-based hybrid signcryption scheme

JB Klamti, MA Hasan - Journal of Mathematical Cryptology, 2023 - degruyter.com
A key encapsulation mechanism (KEM) that takes as input an arbitrary string, ie, a tag, is
known as tag-KEM, while a scheme that combines signature and encryption is called …

[PDF][PDF] Tribrid Secure Encryption Technique to Protect the data in the Cloud

KP BinduMadavi, P Vijayakarthick… - Design …, 2021 - researchgate.net
In recent years, the use of cloud computing has grown exponentially. All organizations move
to the cloud to take advantage of data availability, cost savings, and energy savings. The …