[HTML][HTML] A code-based signature scheme from the Lyubashevsky framework

Y Song, X Huang, Y Mu, W Wu, H Wang - Theoretical Computer Science, 2020 - Elsevier
We propose a new method to construct code-based signature scheme following the
Lyubashevsky's lattice-based framework. Our technique ensures that the Hamming weight of …

Confidentiality-preserving based on attribute encryption using auditable access during encrypted records in cloud location

J Raja, M Ramakrishnan - The Journal of Supercomputing, 2020 - Springer
Managing and using industrial Big Data is a big challenge for every industrial enterprise
manager. By using the cloud technology, enterprises can handover the task of heavy data …

Converting Fixed-Length Binary Strings into Constant Weight Words: Application on Post-Quantum Cryptography

M López-García, DG Farouk-Marei… - … on Dependable and …, 2024 - ieeexplore.ieee.org
This paper presents a new algorithm for encoding binary strings of fixed-length into a word
of constant Hamming weight and constant length. The primary difference compared to …

Efficient ASIC Architectures for Low Latency Niederreiter Decryption

D Fallnich, S Zhang, T Gemmeke - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Post-quantum cryptography addresses the increasing threat that quantum computing poses
to modern communication systems. Among the available" quantum-resistant" systems, the …

Toward practical code-based signature: Implementing fast and compact QC-LDGM signature scheme on embedded hardware

J Hu, RCC Cheung - … Transactions on Circuits and Systems I …, 2017 - ieeexplore.ieee.org
In this paper, fast and compact implementations for code-based signature are presented.
Existing designs are either using enormous memory storage or suffering from slow issuing …

Compact code-based signature for reconfigurable devices with side channel resilience

J Hu, Y Liu, RCC Cheung, S Bhasin… - … on Circuits and …, 2020 - ieeexplore.ieee.org
In this paper, we present a compact design for the code based signature called LEDAsig
with side channel resistance. Existing implementations concentrate on the high-speed …

A New Approximation Method for Constant Weight Coding and Its Hardware Implementation

J Hu, RCC Cheung - Recent Advances in Cryptography and …, 2018 - books.google.com
In this chapter, a more memory-efficient method for encoding binary information into words
of prescribed length and weight is presented. The solutions in existing work include complex …

[引用][C] FPGA BASED HYBRID NAGIVATION SYSTEM FOR SECURITY APPLICATIONS

NB TATINI - 2018 - Vaddeswaram