[go: up one dir, main page]

Sendrier, 2025 - Google Patents

Niederreiter encryption scheme

Sendrier, 2025

Document ID
16959768830002578022
Author
Sendrier N
Publication year
Publication venue
Encyclopedia of Cryptography, Security and Privacy

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys

Similar Documents

Publication Publication Date Title
Cherbal et al. Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing
Deogirikar et al. Security attacks in IoT: A survey
Canard et al. BlindIDS: Market-compliant and privacy-friendly intrusion detection system over encrypted traffic
Bhagat et al. Lightweight cryptographic algorithms based on different model architectures: A systematic review and futuristic applications
Fan et al. Spabox: Safeguarding privacy during deep packet inspection at a middlebox
Kumar et al. A comprehensive taxonomy of security and privacy issues in RFID
Hankerson et al. NIST elliptic curves
Sendrier Niederreiter encryption scheme
Rao et al. DEC‐LADE: Dual elliptic curve‐based lightweight authentication and data encryption scheme for resource constrained smart devices
Biryukov Meet-in-the-middle attack
Kaliski Moore’s Law
Biryukov Miss-in-the-middle attack
Duplys et al. TLS Cryptography In-Depth
Vauclair NFC
AJ et al. Secure IoV communications for smart fleet systems empowered with ASCON
Biryukov Multiset attack
Lara et al. Trends on computer security: Cryptography, user authentication, denial of service and intrusion detection
Kaliski Number Field
Naccache Naccache–Stern Higher Residues Cryptosystem
Sako Nyberg–Rueppel Signature Scheme
Sunar Multiprecision Squaring
Bauer Maxims
Varshney et al. Cyber crime awareness and corresponding countermeasures
Othman et al. Secure and energy-efficient data aggregation for wireless sensor networks
Apavatjrut et al. Energy efficient authentication strategies for network coding