000 | 03068nam a22004935i 4500 | ||
---|---|---|---|
001 | 978-3-319-02556-8 | ||
003 | DE-He213 | ||
005 | 20200421111658.0 | ||
007 | cr nn 008mamaa | ||
008 | 140502s2014 gw | s |||| 0|eng d | ||
020 |
_a9783319025568 _9978-3-319-02556-8 |
||
024 | 7 |
_a10.1007/978-3-319-02556-8 _2doi |
|
050 | 4 | _aTK1-9971 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aBaldi, Marco. _eauthor. |
|
245 | 1 | 0 |
_aQC-LDPC Code-Based Cryptography _h[electronic resource] / _cby Marco Baldi. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aXVI, 120 p. 15 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Electrical and Computer Engineering, _x2191-8112 |
|
505 | 0 | _aIntroduction -- Low-Density Parity-Check Codes -- Quasi-Cyclic Codes -- Quasi-Cyclic Low-Density Parity-Check Codes -- The McEliece and Niederreiter Cryptosystems -- QC-LDPC Code-based Cryptosystems. | |
520 | _aThis book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes. In the first part of the book, the main characteristics of QC-LDPC codes are reviewed, and several techniques for their design are presented, while tools for assessing the error correction performance of these codes are also described. Some families of QC-LDPC codes that are best suited for use in cryptography are also presented. The second part of the book focuses on the McEliece and Niederreiter cryptosystems, both in their original forms and in some subsequent variants. The applicability of QC-LDPC codes in these frameworks is investigated by means of theoretical analyses and numerical tools, in order to assess their benefits and drawbacks in terms of system efficiency and security. Several examples of QC-LDPC code-based public key cryptosystems are presented, and their advantages over classical solutions are highlighted. The possibility of also using QC-LDPC codes in symmetric encryption schemes and digital signature algorithms is also briefly examined. | ||
650 | 0 | _aEngineering. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aCoding theory. | |
650 | 0 | _aElectrical engineering. | |
650 | 1 | 4 | _aEngineering. |
650 | 2 | 4 | _aCommunications Engineering, Networks. |
650 | 2 | 4 | _aCoding and Information Theory. |
650 | 2 | 4 | _aSystems and Data Security. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319025551 |
830 | 0 |
_aSpringerBriefs in Electrical and Computer Engineering, _x2191-8112 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-02556-8 |
912 | _aZDB-2-ENG | ||
942 | _cEBK | ||
999 |
_c54842 _d54842 |