Post-quantum cryptography aims at securing exchanges against an adversary with a quantum computer. One approach considered to achieve post-quantum public key encryption relies on hard problems in coding theory. The key encapsulation mechanism BIKE, submitted to the NIST post-quantum cryptography standardization process, uses QC-MDPC codes whose quasi-cyclicity allows for a compact key representation. However, their decoding algorithms have a non-zero probability of failure (DFR) and this can be a security concern as demonstrated by Guo, Johansson and Stankovski. This work therefore focuses on the implementation and security of BIKE from the decoder's perspective. First, we design new algorithms that drastically reduce the DFR. These algorit...
Public-key cryptography (PKC) allows exchanging keys over an insecure channel without sharing a secr...
The anticipated emergence of quantum computers in the foreseeable future drives the cryptographic co...
The security of modern cryptography is based on the hardness of solving certain problems. In this co...
Post-quantum cryptography aims at securing exchanges against an adversary with a quantum computer. O...
Today, most public-key cryptosystems used to ensure the privacy and authenticity of communications r...
Public-key cryptosystems built on quasi-cyclic (QC) low-density parity-check and moderate-density pa...
The aim of this document is to clarify the DFR (Decoding Failure Rate) claims made for BIKE, a third...
Code-based cryptography has received a lot of attention recently because it is considered secure und...
We present a variant of the classic in-place bit-flipping decoder, frequently used with Low- and Mod...
QcBits is a code-based public key algorithm based on a problem thought to be resistant to quantum co...
BIKE is a code-based key encapsulation mechanism (KEM) that was recently selected as an alternate ca...
Considering the McEliece cryptosystem using quasi-cylcic MDPC (Moderate Density Parity Check matrix)...
L’utilisation des codes MDPC (Moderate Density Parity Check) quasi-cycliques dans le cryptosystème d...
As quantum computers become more and more plausible, it is important to redesign cryptography in ord...
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention ...
Public-key cryptography (PKC) allows exchanging keys over an insecure channel without sharing a secr...
The anticipated emergence of quantum computers in the foreseeable future drives the cryptographic co...
The security of modern cryptography is based on the hardness of solving certain problems. In this co...
Post-quantum cryptography aims at securing exchanges against an adversary with a quantum computer. O...
Today, most public-key cryptosystems used to ensure the privacy and authenticity of communications r...
Public-key cryptosystems built on quasi-cyclic (QC) low-density parity-check and moderate-density pa...
The aim of this document is to clarify the DFR (Decoding Failure Rate) claims made for BIKE, a third...
Code-based cryptography has received a lot of attention recently because it is considered secure und...
We present a variant of the classic in-place bit-flipping decoder, frequently used with Low- and Mod...
QcBits is a code-based public key algorithm based on a problem thought to be resistant to quantum co...
BIKE is a code-based key encapsulation mechanism (KEM) that was recently selected as an alternate ca...
Considering the McEliece cryptosystem using quasi-cylcic MDPC (Moderate Density Parity Check matrix)...
L’utilisation des codes MDPC (Moderate Density Parity Check) quasi-cycliques dans le cryptosystème d...
As quantum computers become more and more plausible, it is important to redesign cryptography in ord...
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention ...
Public-key cryptography (PKC) allows exchanging keys over an insecure channel without sharing a secr...
The anticipated emergence of quantum computers in the foreseeable future drives the cryptographic co...
The security of modern cryptography is based on the hardness of solving certain problems. In this co...