QC-LDPC Code-Based Cryptography

QC-LDPC Code-Based Cryptography PDF Author: Marco Baldi
Publisher: Springer Science & Business
ISBN: 3319025562
Category : Technology & Engineering
Languages : en
Pages : 120

Get Book

Book Description
This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes. In the first part of the book, the main characteristics of QC-LDPC codes are reviewed, and several techniques for their design are presented, while tools for assessing the error correction performance of these codes are also described. Some families of QC-LDPC codes that are best suited for use in cryptography are also presented. The second part of the book focuses on the McEliece and Niederreiter cryptosystems, both in their original forms and in some subsequent variants. The applicability of QC-LDPC codes in these frameworks is investigated by means of theoretical analyses and numerical tools, in order to assess their benefits and drawbacks in terms of system efficiency and security. Several examples of QC-LDPC code-based public key cryptosystems are presented, and their advantages over classical solutions are highlighted. The possibility of also using QC-LDPC codes in symmetric encryption schemes and digital signature algorithms is also briefly examined.

QC-LDPC Code-Based Cryptography

QC-LDPC Code-Based Cryptography PDF Author: Marco Baldi
Publisher: Springer Science & Business
ISBN: 3319025562
Category : Technology & Engineering
Languages : en
Pages : 120

Get Book

Book Description
This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes. In the first part of the book, the main characteristics of QC-LDPC codes are reviewed, and several techniques for their design are presented, while tools for assessing the error correction performance of these codes are also described. Some families of QC-LDPC codes that are best suited for use in cryptography are also presented. The second part of the book focuses on the McEliece and Niederreiter cryptosystems, both in their original forms and in some subsequent variants. The applicability of QC-LDPC codes in these frameworks is investigated by means of theoretical analyses and numerical tools, in order to assess their benefits and drawbacks in terms of system efficiency and security. Several examples of QC-LDPC code-based public key cryptosystems are presented, and their advantages over classical solutions are highlighted. The possibility of also using QC-LDPC codes in symmetric encryption schemes and digital signature algorithms is also briefly examined.

Code-Based Cryptography

Code-Based Cryptography PDF Author: Marco Baldi
Publisher: Springer Nature
ISBN: 303054074X
Category : Computers
Languages : en
Pages : 148

Get Book

Book Description
This book constitutes the refereed and revised post-conference proceedings of the 8th International Workshop on Code-Based Cryptography, CBCrypto 2020, held in Zagreb, Croatia, in May 2020.* The seven papers presented in this book were carefully reviewed and selected from numerous submissions. These contributions focus on various topics such as code-based cryptography, from design to implementation, security, new systems, and improved decoding algorithms. * The conference was held virtually due to the COVID-19 pandemic.

Code-Based Cryptography

Code-Based Cryptography PDF Author: Marco Baldi
Publisher: Springer
ISBN: 3030259226
Category : Computers
Languages : en
Pages : 149

Get Book

Book Description
This book constitutes the refereed and revised post-conference proceedings of the 7th International Workshop on Code-Based Cryptography, CBC 2019, held in Darmstadt, Germany, in May 2019. The eight papers presented in this book were carefully reviewed and selected from numerous submissions. These contributions are divided into two groups: The first four papers deal with the design of code-based cryptosystems, while the following four papers are on cryptanalysis of code-based cryptosystems.

Code-Based Cryptography

Code-Based Cryptography PDF Author: Antonia Wachter-Zeh
Publisher: Springer Nature
ISBN: 303098365X
Category : Computers
Languages : en
Pages : 132

Get Book

Book Description
This book constitutes the proceedings of the 9th International Workshop on Code-Based Cryptography, CBCrypto 2021, which was held during June 21-22, 2021. The workshop was initially planned to take place in Munich, Germany, but changed to an online event due to the COVID-19 pandemic. The 6 papers presented in this volume were carefully reviewed and selected from 14 submissions. These contributions span all aspects of code-based cryptography, from design to implementation, and including studies of security, new systems, and improved decoding algorithms.

Code-Based Cryptography

Code-Based Cryptography PDF Author: Andre Esser
Publisher: Springer Nature
ISBN: 3031464958
Category : Computers
Languages : en
Pages : 183

Get Book

Book Description
This book constitutes the refereed proceedings of the 11th International Conference on Code-Based Cryptography, CBCrypto 2023, held in Lyon, France, during April 22–23, 2023. The 8 full papers included in this book were carefully reviewed and selected from 28 submissions. The conference offers a wide range of many important aspects of code-based cryptography such as cryptanalysis of existing schemes, the proposal of new cryptographic systems and protocols as well as improved decoding algorithms.

Selected Areas in Cryptography – SAC 2019

Selected Areas in Cryptography – SAC 2019 PDF Author: Kenneth G. Paterson
Publisher: Springer Nature
ISBN: 3030384713
Category : Computers
Languages : en
Pages : 715

Get Book

Book Description
This book contains revised selected papers from the 26th International Conference on Selected Areas in Cryptography, SAC 2019, held in Waterloo, ON, Canada, in August 2019. The 26 full papers presented in this volume were carefully reviewed and selected from 74 submissions. They cover the following research areas: Design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, cryptography for the Internet of Things.

Post-Quantum Cryptography

Post-Quantum Cryptography PDF Author: Tanja Lange
Publisher: Springer
ISBN: 3319790633
Category : Computers
Languages : en
Pages : 529

Get Book

Book Description
This book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography, PQCrypto 2018, held in Fort Lauderdale, FL, USA, in April 2018. The 24 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on Code-based Cryptography; Cryptanalysis; Hash-based Cryptography; Isogenies in Cryptography; Lattice-based Cryptography; Multivariate Cryptography; Protocols; Quantum Algorithms.

Security and Cryptography for Networks

Security and Cryptography for Networks PDF Author: Rafail Ostrovsky
Publisher: Springer
ISBN: 3540858555
Category : Computers
Languages : en
Pages : 423

Get Book

Book Description
This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008. The book contains one invited talk and 26 revised full papers which were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and Cryptanalysis, and Key Exchange.

Cryptology and Network Security

Cryptology and Network Security PDF Author: Jan Camenisch
Publisher: Springer
ISBN: 3030004341
Category : Computers
Languages : en
Pages : 518

Get Book

Book Description
This book constitutes the refereed proceedings of the 17th International Conference on Cryptology and Network Security, CANS 2018, held in Naples, Italy, in September/October 2018. The 26 full papers were carefully reviewed and selected from 79 submissions. The papers are organized in the following topical sections: privacy; Internet misbehavior and protection; malware; symmetric key cryptography; signatures; cryptanalysis; cryptographic primitives; and cryptographic protocols.

Big Data Technology and Applications

Big Data Technology and Applications PDF Author: Wenguang Chen
Publisher: Springer
ISBN: 9811004579
Category : Computers
Languages : en
Pages : 324

Get Book

Book Description
This book constitutes the refereed proceedings of the First National Conference on Big Data Technology and Applications, BDTA 2015, held in Harbin, China, in December 2015. The 26 revised papers presented were carefully reviewed and selected from numerous submissions. The papers address issues such as the storage technology of Big Data; analysis of Big Data and data mining; visualization of Big Data; the parallel computing framework under Big Data; the architecture and basic theory of Big Data; collection and preprocessing of Big Data; innovative applications in some areas, such as internet of things and cloud computing.