000 03068nam a22004935i 4500
001 978-3-319-02556-8
003 DE-He213
005 20200421111658.0
007 cr nn 008mamaa
008 140502s2014 gw | s |||| 0|eng d
020 _a9783319025568
_9978-3-319-02556-8
024 7 _a10.1007/978-3-319-02556-8
_2doi
050 4 _aTK1-9971
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
082 0 4 _a621.382
_223
100 1 _aBaldi, Marco.
_eauthor.
245 1 0 _aQC-LDPC Code-Based Cryptography
_h[electronic resource] /
_cby Marco Baldi.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2014.
300 _aXVI, 120 p. 15 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Electrical and Computer Engineering,
_x2191-8112
505 0 _aIntroduction -- Low-Density Parity-Check Codes -- Quasi-Cyclic Codes -- Quasi-Cyclic Low-Density Parity-Check Codes -- The McEliece and Niederreiter Cryptosystems -- QC-LDPC Code-based Cryptosystems.
520 _aThis book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes. In the first part of the book, the main characteristics of QC-LDPC codes are reviewed, and several techniques for their design are presented, while tools for assessing the error correction performance of these codes are also described. Some families of QC-LDPC codes that are best suited for use in cryptography are also presented. The second part of the book focuses on the McEliece and Niederreiter cryptosystems, both in their original forms and in some subsequent variants. The applicability of QC-LDPC codes in these frameworks is investigated by means of theoretical analyses and numerical tools, in order to assess their benefits and drawbacks in terms of system efficiency and security. Several examples of QC-LDPC code-based public key cryptosystems are presented, and their advantages over classical solutions are highlighted. The possibility of also using QC-LDPC codes in symmetric encryption schemes and digital signature algorithms is also briefly examined.
650 0 _aEngineering.
650 0 _aComputer security.
650 0 _aCoding theory.
650 0 _aElectrical engineering.
650 1 4 _aEngineering.
650 2 4 _aCommunications Engineering, Networks.
650 2 4 _aCoding and Information Theory.
650 2 4 _aSystems and Data Security.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319025551
830 0 _aSpringerBriefs in Electrical and Computer Engineering,
_x2191-8112
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-02556-8
912 _aZDB-2-ENG
942 _cEBK
999 _c54842
_d54842