An efficient and provably secure public key encryption scheme based on coding theory

Author:

Lu Rongxing,Lin Xiaodong,Liang Xiaohui,Shen Xuemin Sherman

Publisher

Wiley

Subject

Computer Networks and Communications,Information Systems

Reference33 articles.

1. New (t,n) threshold directed signature scheme with provable security;Lu;Information Sciences,2008

2. Tua: a novel compromise-resilient authentication architecture for wireless mesh networks;Lin;IEEE Transactions on Wireless Communications,2008

3. Efficient remote user authentication scheme using smart card;Lu;Computer Networks,2005

4. McEliece RJ. DSN Progress Report 114-116 1978

5. Knapsack-type cryptosystems and algebraic coding theory;Niederreiter;Problems of Control and Information Theory,1986

Cited by 6 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Post-Quantum Network Security:McEliece and Niederreiter Cryptosystems Analysis and Education Issues;WSEAS TRANSACTIONS ON SYSTEMS AND CONTROL;2020-11-19

2. Physical Layer based Message Authentication with Secure Channel Codes;IEEE Transactions on Dependable and Secure Computing;2020-09-01

3. Multi-message Authentication over Noisy Channel with Polar Codes;2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS);2017-10

4. McEliece and Niederreiter Cryptosystems Analysis in the Context of Post-Quantum Network Security;2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI);2017-08

5. A New Public Key Encryption Scheme based on Layered Cellular Automata;KSII Transactions on Internet and Information Systems;2014-10-31

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3