Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Efficient pseudorandom correlation generators: Silent OT extension and more
Secure multiparty computation (MPC) often relies on correlated randomness for better
efficiency and simplicity. This is particularly useful for MPC with no honest majority, where …
efficiency and simplicity. This is particularly useful for MPC with no honest majority, where …
Efficient two-round OT extension and silent non-interactive secure computation
We consider the problem of securely generating useful instances of two-party correlations,
such as many independent copies of a random oblivious transfer (OT) correlation, using a …
such as many independent copies of a random oblivious transfer (OT) correlation, using a …
[PDF][PDF] Hamming quasi-cyclic (HQC)
Digital copies of the signed statements were provided to NIST in the original submission on
Nov. 30, 2017. The paper versions have been provided to NIST at the First PQC …
Nov. 30, 2017. The paper versions have been provided to NIST at the First PQC …
[PDF][PDF] BIKE: bit flip** key encapsulation
4 Design Rationale and Considerations (2. B. 6) 11 4.1 What is BIKE and how should it be
used?............... 11 4.1. 1 What is BIKE in one sentence?................. 11 4.1. 2 How many …
used?............... 11 4.1. 1 What is BIKE in one sentence?................. 11 4.1. 2 How many …
Efficient encryption from random quasi-cyclic codes
We propose a framework for constructing efficient code-based encryption schemes that do
not hide any structure in their public matrix. The framework is in the spirit of the schemes first …
not hide any structure in their public matrix. The framework is in the spirit of the schemes first …
Post-quantum cryptography based on codes: State of the art and open challenges
A new generation of cryptographic primitives is on the horizon and they are likely to replace
soon many previous and widespread systems. This is due to the cybersecurity threat …
soon many previous and widespread systems. This is due to the cybersecurity threat …
FuLeeca: a Lee-based signature scheme
In this work, we introduce a new code-based signature scheme, called FuLeeca, based on
the NP-hard problem of finding codewords of given Lee-weight. The scheme follows the …
the NP-hard problem of finding codewords of given Lee-weight. The scheme follows the …
Secure and compact: a new variant of McEliece cryptosystem
E Bindal, AK Singh - IEEE Access, 2024 - ieeexplore.ieee.org
This paper introduces a variant of the McEliece cryptosystem and employs the-construction
to generate a new code from two arbitrary linear codes. We propose an efficient hard …
to generate a new code from two arbitrary linear codes. We propose an efficient hard …
Cryptanalysis of ledacrypt
We report on the concrete cryptanalysis of LEDAcrypt, a 2nd Round candidate in NIST's Post-
Quantum Cryptography standardization process and one of 17 encryption schemes that …
Quantum Cryptography standardization process and one of 17 encryption schemes that …
Improved Veron identification and signature schemes in the rank metric
It is notably challenging to design an efficient and secure signature scheme based on error-
correcting codes. An approach to build such signature schemes is to derive it from an …
correcting codes. An approach to build such signature schemes is to derive it from an …