Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on code-based cryptography
V Weger, N Gassner, J Rosenthal - arxiv preprint arxiv:2201.07119, 2022 - arxiv.org
The improvements on quantum technology are threatening our daily cybersecurity, as a
capable quantum computer can break all currently employed asymmetric cryptosystems. In …
capable quantum computer can break all currently employed asymmetric cryptosystems. In …
Zero knowledge protocols and signatures from the restricted syndrome decoding problem
Abstract The Restricted Syndrome Decoding Problem (R-SDP) cor-responds to the
Syndrome Decoding Problem (SDP) with the additional constraint that all entries of the …
Syndrome Decoding Problem (SDP) with the additional constraint that all entries of the …
FuLeeca: a Lee-based signature scheme
In this work, we introduce a new code-based signature scheme, called FuLeeca, based on
the NP-hard problem of finding codewords of given Lee-weight. The scheme follows the …
the NP-hard problem of finding codewords of given Lee-weight. The scheme follows the …
[HTML][HTML] Density of free modules over finite chain rings
In this paper we focus on modules over a finite chain ring R of size q s. We compute the
density of free modules of R n, where we separately treat the asymptotics in n, q and s. In …
density of free modules of R n, where we separately treat the asymptotics in n, q and s. In …
Code-based cryptography with generalized concatenated codes for restricted error values
JP Thiers, J Freudenberger - IEEE Open Journal of the …, 2022 - ieeexplore.ieee.org
Code-based cryptosystems are promising candidates for post-quantum cryptography.
Recently, generalized concatenated codes over Gaussian and Eisenstein integers were …
Recently, generalized concatenated codes over Gaussian and Eisenstein integers were …
On the (In) security of optimized Stern-like signature schemes
A Chailloux, S Etinski - Designs, Codes and Cryptography, 2024 - Springer
Stern's signature scheme is a historically important code-based signature scheme. A crucial
optimization of this scheme is to generate pseudo-random vectors and permutation instead …
optimization of this scheme is to generate pseudo-random vectors and permutation instead …
Generic decoding of restricted errors
Several recently proposed code-based cryptosystems base their security on a slightly
generalized version of the classical (syndrome) decoding problem. Namely, in the so-called …
generalized version of the classical (syndrome) decoding problem. Namely, in the so-called …
Information set decoding for Lee-metric codes using restricted balls
The Lee metric syndrome decoding problem is an NP-hard problem and several generic
decoders have been proposed. The observation that such decoders come with a larger cost …
decoders have been proposed. The observation that such decoders come with a larger cost …
Error-correction performance of regular ring-linear ldpc codes over lee channels
Most low-density parity-check (LDPC) code constructions are considered over finite fields. In
this work, we focus on regular LDPC codes over integer residue rings and analyze their …
this work, we focus on regular LDPC codes over integer residue rings and analyze their …
On the properties of error patterns in the constant Lee weight channel
The problem of scalar multiplication applied to vectors is considered in the Lee metric.
Unlike in other metrics, the Lee weight of a vector may be increased or decreased by the …
Unlike in other metrics, the Lee weight of a vector may be increased or decreased by the …