LEDAkem: A post-quantum key encapsulation mechanism based on QC-LDPC codes
This work presents a new code-based key encapsulation mechanism (KEM) called
LEDAkem. It is built on the Niederreiter cryptosystem and relies on quasi-cyclic low-density …
LEDAkem. It is built on the Niederreiter cryptosystem and relies on quasi-cyclic low-density …
A privacy-preserving code-based authentication protocol for Internet of Things
Abstract The Internet of Things (IoT) is an upcoming technology that permits to interconnect
different devices and machines using heterogeneous networks. One of the most critical …
different devices and machines using heterogeneous networks. One of the most critical …
On the Development and Standardisation of Post-Quantum Cryptography-A Synopsis of the NIST Post-Quantum Cryptography Standardisation Process, its Incentives …
MW Legernaes - 2018 - ntnuopen.ntnu.no
Due to developments within the field of quantum computers, the need for develo** and
implementing quantum-resistant cryptographic algorithms has become more urgent. Using …
implementing quantum-resistant cryptographic algorithms has become more urgent. Using …
A code-based hybrid signcryption scheme
JB Klamti, MA Hasan - Journal of Mathematical Cryptology, 2023 - degruyter.com
A key encapsulation mechanism (KEM) that takes as input an arbitrary string, ie, a tag, is
known as tag-KEM, while a scheme that combines signature and encryption is called …
known as tag-KEM, while a scheme that combines signature and encryption is called …
[PDF][PDF] Tribrid Secure Encryption Technique to Protect the data in the Cloud
KP BinduMadavi, P Vijayakarthick… - Design …, 2021 - researchgate.net
In recent years, the use of cloud computing has grown exponentially. All organizations move
to the cloud to take advantage of data availability, cost savings, and energy savings. The …
to the cloud to take advantage of data availability, cost savings, and energy savings. The …