Academic literature on the topic 'Mceliece optimization'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mceliece optimization.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Mceliece optimization"
Marek, Repka. "McEliece PKC Calculator." Journal of Electrical Engineering 65, no. 6 (January 31, 2015): 342–48. http://dx.doi.org/10.2478/jee-2014-0056.
Full textEpelde, M. ,., E. F. Combarro,, and I. F. R ́ua,. "DECODING M-ARY LINEAR CODES WITH THE QUANTUM APPROXIMATE OPTIMIZATION ALGORITHM." Eurasian Journal of Mathematical and Computer Applications 10, no. 1 (March 2022): 4–25. http://dx.doi.org/10.32523/2306-6172-2022-10-1-4-25.
Full textChizhov, I. V. "The number of public keys in the McEliece-Sidel’nikov cryptosystem." Moscow University Computational Mathematics and Cybernetics 33, no. 3 (September 2009): 151–57. http://dx.doi.org/10.3103/s0278641909030066.
Full textKarthik, M., and M. Krishnan. "Securing an Internet of Things from Distributed Denial of Service and Mirai Botnet Attacks Using a Novel Hybrid Detection and Mitigation Mechanism." International Journal of Intelligent Engineering and Systems 14, no. 1 (February 28, 2021): 113–23. http://dx.doi.org/10.22266/ijies2021.0228.12.
Full textOvchinnikov, Andrey. "The variant of post-quantum cryptosystem based on burst-correcting codes and on the complete decoding problem." Information and Control Systems, no. 3 (June 24, 2022): 45–54. http://dx.doi.org/10.31799/1684-8853-2022-3-45-54.
Full textDissertations / Theses on the topic "Mceliece optimization"
DE, PICCOLI ALESSANDRO. "OPTIMIZED REPRESENTATIONS IN CRYPTOGRAPHIC PRIMITIVES." Doctoral thesis, Università degli Studi di Milano, 2022. http://hdl.handle.net/2434/932549.
Full textThis work focuses on optimization of cryptographic primitives both in theory and in applications. From a theoretical point of view, it addresses the problem of speeding up the polynomial multiplication used in Post-Quantum cryptosystems such as NTRU and McEliece. In particular, the latter extensively uses Galois fields whose elements can be represented in polynomial form. After presenting the reduction of the number of gates for polynomial multiplication through new techniques, in this work experimental results of such techniques applied to the current implementation of McEliece will be presented. From a practical point of view, this work focuses on the optimization of a SAT solver-based preimage attack against SHA-1 and on its strength. None of the tested representations of SHA-1 seems to be competitive in terms of resolution. On the contrary, an accurate choice of some pre-image bits allows one to reach a better state of art, revealing meanwhile the weakness of some pre-images.
Conference papers on the topic "Mceliece optimization"
Baldi, Marco, Marco Bianchi, and Franco Chiaraluce. "Optimization of the parity-check matrix density in QC-LDPC code-based McEliece cryptosystems." In 2013 ICC - 2013 IEEE International Conference on Communication Workshop (ICC). IEEE, 2013. http://dx.doi.org/10.1109/iccw.2013.6649325.
Full text