Academic literature on the topic 'Mceliece optimization'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mceliece optimization.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Mceliece optimization"

1

Marek, Repka. "McEliece PKC Calculator." Journal of Electrical Engineering 65, no. 6 (January 31, 2015): 342–48. http://dx.doi.org/10.2478/jee-2014-0056.

Full text
Abstract:
Abstract The original McEliece PKC proposal is interesting thanks to its resistance against all known attacks, even using quantum cryptanalysis, in an IND-CCA2 secure conversion. Here we present a generic implementation of the original McEliece PKC proposal, which provides test vectors (for all important intermediate results), and also in which a measurement tool for side-channel analysis is employed. To our best knowledge, this is the first such an implementation. This Calculator is valuable in implementation optimization, in further McEliece/Niederreiter like PKCs properties investigations, and also in teaching. Thanks to that, one can, for example, examine side-channel vulnerability of a certain implementation, or one can find out and test particular parameters of the cryptosystem in order to make them appropriate for an efficient hardware implementation. This implementation is available [1] in executable binary format, and as a static C++ library, as well as in form of source codes, for Linux and Windows operating systems.
APA, Harvard, Vancouver, ISO, and other styles
2

Epelde, M. ,., E. F. Combarro,, and I. F. R ́ua,. "DECODING M-ARY LINEAR CODES WITH THE QUANTUM APPROXIMATE OPTIMIZATION ALGORITHM." Eurasian Journal of Mathematical and Computer Applications 10, no. 1 (March 2022): 4–25. http://dx.doi.org/10.32523/2306-6172-2022-10-1-4-25.

Full text
Abstract:
Abstract The NP-hardness of the Minimum Distance Decoding Problem (MDDP) is the core of the McEliece cryptosystem. The difficulty of decoding a received word to the closest codeword in a given arbitrary code is key to its security. Related to the MDDP is the Coset Leader Problem (CLP), which consists in finding a word of a given syndrome and minimum Hamming weight. Both can be modelled as optimization problems, and solved using the Quantum Approximate Optimization Algorithm (QAOA), a well-known hybrid quantum- classical algorithm. In this paper, we model both the MDDP and CLP for linear codes over arbitrary m−ary alphabets, we make the theoretical analysis of the first level for the binary CLP problem, and introduce some experiments to test its performance. The experiments were carried out on both quantum computer simulators and real quantum devices, and use codes of different lengths and different depths of the QAOA.
APA, Harvard, Vancouver, ISO, and other styles
3

Chizhov, I. V. "The number of public keys in the McEliece-Sidel’nikov cryptosystem." Moscow University Computational Mathematics and Cybernetics 33, no. 3 (September 2009): 151–57. http://dx.doi.org/10.3103/s0278641909030066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Karthik, M., and M. Krishnan. "Securing an Internet of Things from Distributed Denial of Service and Mirai Botnet Attacks Using a Novel Hybrid Detection and Mitigation Mechanism." International Journal of Intelligent Engineering and Systems 14, no. 1 (February 28, 2021): 113–23. http://dx.doi.org/10.22266/ijies2021.0228.12.

Full text
Abstract:
Internet of Things (IoT) has become more familiar in all applications and industrial fields such as medical, military, transportation, etc. It has some limitations because of the attack model in the transmission or communication channel. Moreover, one of the deadliest attacks is known as a Distributed Denial of Service Attack (DDoS). The Presence of DDoS in network layer cause huge damage in data transmission channel that ends in data loss or collapse. To address this issue the current research focused on an innovative detection and mitigation of Mirai and DDoS attack in IoT environment. Initially, number of IoT devices is arranged with the help of a novel Hybrid Strawberry and African Buffalo Optimization (HSBABO). Consequently, the types of DDoS attacks are launched in the developed IoT network. Moreover, the presence of strawberry and African Buffalo fitness is utilized to detect and specify the attack types. Subsequently a novel MCELIECE encryption with Cloud Shield scheme is developed to prevent the low and high rate DDoS attack in the Internet of Things. Finally, the proposed model attained 94% of attack detection accuracy, 3% of false negative rate and 5.5% of false positive rate.
APA, Harvard, Vancouver, ISO, and other styles
5

Ovchinnikov, Andrey. "The variant of post-quantum cryptosystem based on burst-correcting codes and on the complete decoding problem." Information and Control Systems, no. 3 (June 24, 2022): 45–54. http://dx.doi.org/10.31799/1684-8853-2022-3-45-54.

Full text
Abstract:
Introduction: Today the investigations of post-quantum cryptosystems secure against quantum computations is the area of great interest. An important direction here is code-based cryptography utilizing the mathematical problems from error-correcting coding theory. The improvement of existing code-based systems may be achieved both in practical part (reducing the key sizes) and theoretically by using more complicated mathematical code-based tasks. Purpose: The development of public-key code-based cryptosystem using low-density parity-check codes with burst correction; the estimation of the parameters of the obtained system. Results: The variant of code-based cryptosystem using random block permutation low-density parity-check codes is proposed. The cryptocomplexity of the system is supposed to be based on the complete decoding problem, which is believed to be a harder mathematical problem than those used in existing systems. With high probability, the analysis of the system by using decoding methods is not possible at all, which both increases the long-term cryptocomplexity of the system and allows to reduce the key size. The evaluation of the underlying code selection is performed, the approaches to the selection of the parameters of the proposed system on the basis of the required level of cryptocomplexity are considered. Practical relevance: The proposed system allows to reduce the public-key size as compared to the classical McEliece system, cryptocomplexity also comparable, with the underlying mathematical problem to be more stable against perspective attacks.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Mceliece optimization"

1

DE, PICCOLI ALESSANDRO. "OPTIMIZED REPRESENTATIONS IN CRYPTOGRAPHIC PRIMITIVES." Doctoral thesis, Università degli Studi di Milano, 2022. http://hdl.handle.net/2434/932549.

Full text
Abstract:
Il lavoro di tesi si focalizza sull'ottimizzazione di primitive crittografiche sia dal punto di vista teorico che da quello pratico. Riguardo il punto di vista teorico sarà analizzato il problema dell'accelerazione degli algoritmi di moltiplicazione polinomiale, ampiamente impiegati in Crittografia Post-Quantum, come, ad esempio, NTRU e McEliece. Quest'ultimo, in particolare, utilizza campi di Galois e loro estensioni, i cui elementi possono essere rappresentati in forma polinomiale. Saranno dunque esposte nuove tecniche che permettono una riduzione del numero di porte logiche e verranno presentati i risultati sperimentali della loro applicazione all'implementazione del cifrario McEliece attualmente candidato come nuovo standard Post-Quantum al NIST. Dal punto di vista pratico, questo lavoro di tesi, si focalizza sull’ottimizzazione di attacchi alla prima pre-immagine dell'algoritmo di hash SHA-1 basati su SAT solvers. Nessuna delle rappresentazioni testate ha mostrato una particolare efficienza in termini di velocità di risoluzione. Al contrario, un'accurata scelta di valori ha permesso di raggiungere un nuovo stato dell'arte, rivelando al contempo la debolezza di alcune pre-immagini.
This work focuses on optimization of cryptographic primitives both in theory and in applications. From a theoretical point of view, it addresses the problem of speeding up the polynomial multiplication used in Post-Quantum cryptosystems such as NTRU and McEliece. In particular, the latter extensively uses Galois fields whose elements can be represented in polynomial form. After presenting the reduction of the number of gates for polynomial multiplication through new techniques, in this work experimental results of such techniques applied to the current implementation of McEliece will be presented. From a practical point of view, this work focuses on the optimization of a SAT solver-based preimage attack against SHA-1 and on its strength. None of the tested representations of SHA-1 seems to be competitive in terms of resolution. On the contrary, an accurate choice of some pre-image bits allows one to reach a better state of art, revealing meanwhile the weakness of some pre-images.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Mceliece optimization"

1

Baldi, Marco, Marco Bianchi, and Franco Chiaraluce. "Optimization of the parity-check matrix density in QC-LDPC code-based McEliece cryptosystems." In 2013 ICC - 2013 IEEE International Conference on Communication Workshop (ICC). IEEE, 2013. http://dx.doi.org/10.1109/iccw.2013.6649325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography