A prefix code, a P-code, is a code where no codeword is a prefix of another codeword. In this paper, a symmetric cipher based on prefix codes is proposed. The simplicity of the design makes this cipher usable for Internet of Things applications. Our goal is to investigate the security of this cipher. A detailed analysis of the fundamental properties of P-codes shows that the keyspace of the cipher is too large to mount a brute-force attack. Specifically, in this regard we will find bounds on the number of minimal P-codes containing a binary word given in advance. Furthermore, the statistical attack is difficult to mount on such cryptosystem due to the attacker’s lack of information about the actual words used in the substitution mapping. Th...
International audienceThe McEliece cryptosystem is one of the oldest public-key cryptosystem ever de...
International audienceA non-malleable code is an unkeyed randomized encoding scheme that offers the ...
We present a general purpose algorithm for finding low-weight codewords as well as for decoding a re...
Substitution ciphers normally use prefix free codes there is no code word which is the prefix of s...
Error-correcting codes are used to reconstitute digital data, which are proned to alterations during...
Abstract. For constrained devices, standard cryptographic algorithms can be too big, too slow or too...
A fingerprinting code is a set of codewords that are embedded in each copy of a digital object with ...
In both open and private communication the participants face potential threats from a malicious enem...
Error correcting codes, such as Reed-Solomon codes, can be used to create authentication codes based...
Part I: Theory Provable security is an important goal in the design of public-key cryptosystems. For...
Abstract. Recent advances in block-cipher theory deliver security analyses in models where one or mo...
Today, cryptographic applications are used in nearly all areas of our lives, including the economy, ...
A large part in the design of secure cryptographic primitives consists in identifying hard algorithm...
Komargodski et al. have shown an equivalence between (2,∞) -threshold secret sharing schemes (evolvi...
We study the security of password protocols against off-line dictionary attacks. In addition to the ...
International audienceThe McEliece cryptosystem is one of the oldest public-key cryptosystem ever de...
International audienceA non-malleable code is an unkeyed randomized encoding scheme that offers the ...
We present a general purpose algorithm for finding low-weight codewords as well as for decoding a re...
Substitution ciphers normally use prefix free codes there is no code word which is the prefix of s...
Error-correcting codes are used to reconstitute digital data, which are proned to alterations during...
Abstract. For constrained devices, standard cryptographic algorithms can be too big, too slow or too...
A fingerprinting code is a set of codewords that are embedded in each copy of a digital object with ...
In both open and private communication the participants face potential threats from a malicious enem...
Error correcting codes, such as Reed-Solomon codes, can be used to create authentication codes based...
Part I: Theory Provable security is an important goal in the design of public-key cryptosystems. For...
Abstract. Recent advances in block-cipher theory deliver security analyses in models where one or mo...
Today, cryptographic applications are used in nearly all areas of our lives, including the economy, ...
A large part in the design of secure cryptographic primitives consists in identifying hard algorithm...
Komargodski et al. have shown an equivalence between (2,∞) -threshold secret sharing schemes (evolvi...
We study the security of password protocols against off-line dictionary attacks. In addition to the ...
International audienceThe McEliece cryptosystem is one of the oldest public-key cryptosystem ever de...
International audienceA non-malleable code is an unkeyed randomized encoding scheme that offers the ...
We present a general purpose algorithm for finding low-weight codewords as well as for decoding a re...