QC-LDPC Code-Based Cryptography (Record no. 54842)

000 -LEADER
fixed length control field 03068nam a22004935i 4500
001 - CONTROL NUMBER
control field 978-3-319-02556-8
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421111658.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140502s2014 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319025568
-- 978-3-319-02556-8
082 04 - CLASSIFICATION NUMBER
Call Number 621.382
100 1# - AUTHOR NAME
Author Baldi, Marco.
245 10 - TITLE STATEMENT
Title QC-LDPC Code-Based Cryptography
300 ## - PHYSICAL DESCRIPTION
Number of Pages XVI, 120 p. 15 illus.
490 1# - SERIES STATEMENT
Series statement SpringerBriefs in Electrical and Computer Engineering,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Low-Density Parity-Check Codes -- Quasi-Cyclic Codes -- Quasi-Cyclic Low-Density Parity-Check Codes -- The McEliece and Niederreiter Cryptosystems -- QC-LDPC Code-based Cryptosystems.
520 ## - SUMMARY, ETC.
Summary, etc This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes. In the first part of the book, the main characteristics of QC-LDPC codes are reviewed, and several techniques for their design are presented, while tools for assessing the error correction performance of these codes are also described. Some families of QC-LDPC codes that are best suited for use in cryptography are also presented. The second part of the book focuses on the McEliece and Niederreiter cryptosystems, both in their original forms and in some subsequent variants. The applicability of QC-LDPC codes in these frameworks is investigated by means of theoretical analyses and numerical tools, in order to assess their benefits and drawbacks in terms of system efficiency and security. Several examples of QC-LDPC code-based public key cryptosystems are presented, and their advantages over classical solutions are highlighted. The possibility of also using QC-LDPC codes in symmetric encryption schemes and digital signature algorithms is also briefly examined.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-319-02556-8
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2014.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Engineering.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Coding theory.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electrical engineering.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Engineering.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Communications Engineering, Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Coding and Information Theory.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Systems and Data Security.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2191-8112
912 ## -
-- ZDB-2-ENG

No items available.