Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
SoK: How (not) to design and implement post-quantum cryptography
Post-quantum cryptography has known a Cambrian explosion in the last decade. What
started as a very theoretical and mathematical area has now evolved into a sprawling …
started as a very theoretical and mathematical area has now evolved into a sprawling …
Side channel information set decoding using iterative chunking: Plaintext recovery from the “Classic McEliece” hardware reference implementation
This paper presents an attack based on side-channel information and (ISD) on the code-
based Niederreiter cryptosystem and an evaluation of the practicality of the attack using an …
based Niederreiter cryptosystem and an evaluation of the practicality of the attack using an …
Classical misuse attacks on NIST round 2 PQC: the power of rank-based schemes
L Huguenin-Dumittan, S Vaudenay - International Conference on Applied …, 2020 - Springer
Abstract The US National Institute of Standards and Technology (NIST) recently announced
the public-key cryptosystems (PKC) that have passed to the second round of the post …
the public-key cryptosystems (PKC) that have passed to the second round of the post …
On the effectiveness of time travel to inject COVID-19 alerts
Digital contact tracing apps allow to alert people who have been in contact with people who
may be contagious. The Google/Apple Exposure Notification (GAEN) system is based on …
may be contagious. The Google/Apple Exposure Notification (GAEN) system is based on …
On the state of post-quantum cryptography migration
N Alnahawi, A Wiesmaier, T Grasmeyer, J Geißler… - INFORMATIK 2021, 2021 - dl.gi.de
Safeguarding current and future IT security from quantum computers implies more than the
mere development of Post-Quantum Cryptography (PQC) algorithms. Much work in this …
mere development of Post-Quantum Cryptography (PQC) algorithms. Much work in this …
On constant-time QC-MDPC decoding with negligible failure rate
The QC-MDPC code-based KEM Bit Flip** Key Encapsulation (BIKE) is one of the Round-
2 candidates of the NIST PQC standardization project. It has a variant that is proved to be …
2 candidates of the NIST PQC standardization project. It has a variant that is proved to be …
An efficient, secure and verifiable conjunctive keyword search scheme based on rank metric codes over encrypted outsourced cloud data
V Yousefipoor, T Eghlidos - Computers and Electrical Engineering, 2023 - Elsevier
Public key encryption with keyword search (PEKS) is a cryptographic primitive that allows a
secure search for desired keywords of data users by a cloud server using a search token. To …
secure search for desired keywords of data users by a cloud server using a search token. To …
Faster constant-time decoder for MDPC codes and applications to BIKE KEM
BIKE is a code-based key encapsulation mechanism (KEM) that was recently selected as an
alternate candidate by the NIST's standardization process on post-quantum cryptography …
alternate candidate by the NIST's standardization process on post-quantum cryptography …
A new decryption failure attack against HQC
Q Guo, T Johansson - International Conference on the Theory and …, 2020 - Springer
Abstract HQC is an IND-CCA2 KEM running for standardization in NIST's post-quantum
cryptography project and has advanced to the second round. It is a code-based scheme in …
cryptography project and has advanced to the second round. It is a code-based scheme in …
CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
Public-key encryption (PKE) schemes or key-encapsulation mechanisms (KEMs) are
fundamental cryptographic building blocks to realize secure communication protocols. There …
fundamental cryptographic building blocks to realize secure communication protocols. There …