Sendrier, 2025 - Google Patents
Niederreiter encryption schemeSendrier, 2025
- Document ID
- 16959768830002578022
- Author
- Sendrier N
- Publication year
- Publication venue
- Encyclopedia of Cryptography, Security and Privacy
External Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cherbal et al. | Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing | |
Deogirikar et al. | Security attacks in IoT: A survey | |
Canard et al. | BlindIDS: Market-compliant and privacy-friendly intrusion detection system over encrypted traffic | |
Bhagat et al. | Lightweight cryptographic algorithms based on different model architectures: A systematic review and futuristic applications | |
Fan et al. | Spabox: Safeguarding privacy during deep packet inspection at a middlebox | |
Kumar et al. | A comprehensive taxonomy of security and privacy issues in RFID | |
Hankerson et al. | NIST elliptic curves | |
Sendrier | Niederreiter encryption scheme | |
Rao et al. | DEC‐LADE: Dual elliptic curve‐based lightweight authentication and data encryption scheme for resource constrained smart devices | |
Biryukov | Meet-in-the-middle attack | |
Kaliski | Moore’s Law | |
Biryukov | Miss-in-the-middle attack | |
Duplys et al. | TLS Cryptography In-Depth | |
Vauclair | NFC | |
AJ et al. | Secure IoV communications for smart fleet systems empowered with ASCON | |
Biryukov | Multiset attack | |
Lara et al. | Trends on computer security: Cryptography, user authentication, denial of service and intrusion detection | |
Kaliski | Number Field | |
Naccache | Naccache–Stern Higher Residues Cryptosystem | |
Sako | Nyberg–Rueppel Signature Scheme | |
Sunar | Multiprecision Squaring | |
Bauer | Maxims | |
Varshney et al. | Cyber crime awareness and corresponding countermeasures | |
Othman et al. | Secure and energy-efficient data aggregation for wireless sensor networks | |
Apavatjrut et al. | Energy efficient authentication strategies for network coding |