Research of crypto-code designs construction for using in post quantum cryptography
Open Access
- 4 February 2019
- journal article
- Published by Scientific Journals Publishing House in Development Management
- Vol. 16 (4), 26-39
- https://doi.org/10.21511/dm.4(4).2018.03
Abstract
LLC “CPC “Business Perspectives” - publishing platform for academic journalsKeywords
This publication has 12 references indexed in Scilit:
- Method for calculating of R-learning traffic peakednessPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2017
- Multiservice network security metricPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2017
- On unconditionally binding code-based commitment schemesPublished by Association for Computing Machinery (ACM) ,2017
- Developing of multi-factor authentication method based on niederreiter-mceliece modified crypto-code systemEastern-European Journal of Enterprise Technologies, 2016
- Synergetic Control of Social Networking Services Actors’ InteractionsPublished by Springer Science and Business Media LLC ,2016
- Approaches to selection of combinatorial algorithm for optimization in network traffic control of safety-critical systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- Report on Post-Quantum CryptographyPublished by National Institute of Standards and Technology (NIST) ,2016
- Enhanced Public Key Security for the McEliece CryptosystemJournal of Cryptology, 2014
- McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling AttacksLecture Notes in Computer Science, 2011
- A statistical test suite for random and pseudorandom number generators for cryptographic applicationsPublished by National Institute of Standards and Technology (NIST) ,2010