Unimodal and multimodal biometric sensing systems: a review
MO Oloyede, GP Hancke - IEEE access, 2016 - ieeexplore.ieee.org
Biometric systems are used for the verification and identification of individuals using their
physiological or behavioral features. These features can be categorized into unimodal and …
physiological or behavioral features. These features can be categorized into unimodal and …
A new class of q-ary codes for the McEliece cryptosystem
J Freudenberger, JP Thiers - Cryptography, 2021 - mdpi.com
The McEliece cryptosystem is a promising candidate for post-quantum public-key
encryption. In this work, we propose q-ary codes over Gaussian integers for the McEliece …
encryption. In this work, we propose q-ary codes over Gaussian integers for the McEliece …
Generalized concatenated codes over Gaussian and Eisenstein integers for code-based cryptography
JP Thiers, J Freudenberger - Cryptography, 2021 - mdpi.com
The code-based McEliece and Niederreiter cryptosystems are promising candidates for post-
quantum public-key encryption. Recently, q-ary concatenated codes over Gaussian integers …
quantum public-key encryption. Recently, q-ary concatenated codes over Gaussian integers …
McEliece cryptosystem: simulation and security vulnerabilities
While symmetric key cryptosystems utilise single private key at both ends for encryption and
decryption purposes and this mentioned scenario gives advantages of better speed-up as …
decryption purposes and this mentioned scenario gives advantages of better speed-up as …
The weight-one error channel and its application in code-based cryptography
JP Thiers - 2023 - oparu.uni-ulm.de
Public-key cryptographic algorithms are an essential part of todays cyber security, since
those are required for key exchange protocols, digital signatures, and authentication. But …
those are required for key exchange protocols, digital signatures, and authentication. But …
[PDF][PDF] DOKTOR-INGENIEURS
JP Thiers - 2022 - researchgate.net
Public-key cryptographic algorithms are an essential part of todays cyber security, since
those are required for key exchange protocols, digital signatures, and authentication. But …
those are required for key exchange protocols, digital signatures, and authentication. But …
[PDF][PDF] Generalized Concatenated Codes over Gaussian and Eisenstein Integers for Code-Based Cryptography. Cryptography 2021, 5, 33
JP Thiers, J Freudenberger - 2021 - researchgate.net
The code-based McEliece and Niederreiter cryptosystems are promising candidates for post-
quantum public-key encryption. Recently, q-ary concatenated codes over Gaussian integers …
quantum public-key encryption. Recently, q-ary concatenated codes over Gaussian integers …
Union of code and encryption for channels with class a noise
WF Ravanales, K Herman - 2017 CHILEAN Conference on …, 2017 - ieeexplore.ieee.org
In this paper, we implemented a new McEliece encryption scheme, which consists of a
optimal cyclic code to correct errors of burst. Replaces the matrix permutation by a random …
optimal cyclic code to correct errors of burst. Replaces the matrix permutation by a random …