搜索结果: 1-15 共查到“k code”相关记录266条 . 查询时间(0.109 秒)
清华大学殷柳国教授来中北大学信息与通信工程学院作“Generalized Sparse Codes for Non-Gaussian Channels: Code Design,Algorithms, and Applications”专题报告(图)
清华大学 殷柳国 中北大学信息与通信工程学院 广义随机编码 抗干扰 通信编码
2022/11/24
Browser tool aims to help researchers ID malicious websites,code(图)
Browser tool esearchers ID malicious websites code
2019/11/15
Researchers at North Carolina State University have developed an open-source tool that allows users to track and record the behavior of JavaScript programs without alerting the websites that run those...
Cis-regulatory code for predicting plant cell-type transcriptional response to high salinity
high salinity stress plant cell-type cis-regulatory pCRE
2024/2/28
Multicellular organisms have diverse cell-types with distinct roles in development and responses to the environment. At the transcriptional level, the differences in the environmental response between...
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems
Information theoretic security key agreement physical unclonable functions
2019/7/8
The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random l...
A Modified pqsigRM: RM Code-Based Signature Scheme
Code-based cryptography Courtois Finiasz
2019/6/12
We propose a novel signature scheme based on a modified Reed--Muller (RM) code, which reduces the signing complexity and key size compared to existing code-based signature schemes. This cheme is calle...
Evaluation of Code-based Signature Schemes
post-quantum cryptography code-based cryptography signature scheme
2019/5/23
Code-based cryptographic schemes recently raised to prominence as quantum-safe alternatives to the currently employed number-theoretic constructions, which do not resist quantum attacks. In this artic...
New Code-Based Privacy-Preserving Cryptographic Constructions
Code-based cryptography zero-knowledge range arguments
2019/5/21
Code-based cryptography has a long history but did suffer from periods of slow development. The field has recently attracted a lot of attention as one of the major branches of post-quantum cryptograph...
A Post-Quantum UC-Commitment Scheme in the Global Random Oracle Model from Code-Based Assumptions
Commitment Scheme Universal Composability
2019/2/27
In this work, we propose the first post-quantum UC-commitment scheme in the Global Random Oracle Model, where only one non-programmable random oracle is available. The security of our proposal is base...
Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in PKC 2019
RQCS digital signatures cryptanalysis
2019/2/27
Song, Huang, Mu, and Wu proposed a new code-based signature scheme, the Rank Quasi-Cyclic Signature (RQCS) scheme (PKC 2019, Cryptology ePrint Archive 2019/053), which is based on an IND-CCA2 KEM sche...
Constant-time BCH Error-Correcting Code
Lattice-based cryptography Decryption failures Error-correcting codes
2019/2/25
Decryption failure is a common phenomenon in most lattice-based public-key schemes. To reduce the rate of decryption failure, application of error correction code can be helpful. However, the literatu...
A New Code-based Signature Scheme with Shorter Public Key
Post-Quantum Cryptography Rank Metric Codes Digital Signatures
2019/1/26
Code-based signature has been believed to be a useful authentication tool for post-quantum cryptography. There have been some attempts to construct efficient code-based signatures; however, existing c...
Error Amplification in Code-based Cryptography
post-quantum cryptography MDPC timing attack
2019/1/2
Code-based cryptography is one of the main techniques enabling cryptographic primitives in a post-quantum scenario. In particular, the MDPC scheme is a basic scheme from which many other schemes have ...
Cryptanalysis of a code-based one-time signature
Post-Quantum Cryptography Coding Theory Digital Signature
2018/12/20
In 2012, Lyubashevsky introduced a new framework for building lattice-based signature schemes without resorting to any trapdoor (such as GPV [6] or NTRU [8]). The idea is to sample a set of short latt...