搜索结果: 1-6 共查到“军事学 Goppa codes”相关记录6条 . 查询时间(0.063 秒)
Reducing the Key Size of McEliece Cryptosystem from Goppa Codes via Permutations
McEliece cryptosystem automorphism-incuded Goppa codes quasi-cyclic
2018/11/2
In this paper, we propose a new general construction to reduce the public key size of McEliece-based schemes based on Goppa codes. In particular, we generalize the ideas of automorphism-induced Goppa ...
FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes
post-quantum cryptography code-based cryptography Niederreiter cryptosystem
2017/12/11
This paper presents an FPGA implementation of the Niederreiter cryptosystem using binary Goppa codes, including modules for encryption, decryption, and key generation. We improve over previous impleme...
FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes
post-quantum cryptography code-based cryptography Niederreiter key generation
2017/6/22
This paper presents an post-quantum secure, efficient, and tunable FPGA implementation of the key generation algorithm for the Niederreiter cryptosystem using binary Goppa codes. Our key generator imp...
Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups
McEliece cryptosystem Automorphism group Alternant codes
2016/1/9
The main practical limitation of the McEliece public-key encryption scheme is probably the size of its key.
A famous trend to overcome this issue is to focus on subclasses of alternant/Goppa codes wi...
Decoding square-free Goppa codes over $\F_p$
public-key cryptography coding-based cryptosystems error correction efficient algorithms
2010/7/14
We propose a new, efficient decoding algorithm for square-free (irreducible or otherwise) Goppa codes over $\F_p$ for any prime $p$. If the code in question has degree $t$ and its average code distanc...
Compact McEliece Keys from Goppa Codes
post-quantum cryptography syndrome decoding efficient parameters and algorithms
2009/6/12
The classical McEliece cryptosystem is built upon the class of Goppa codes, which remains
secure to this date in contrast to many other families of codes but leads to very large public keys.
Previou...