LEADER 03897nam 22006975 450 001 9910299745303321 005 20200704025642.0 010 $a3-319-02556-2 024 7 $a10.1007/978-3-319-02556-8 035 $a(CKB)3710000000107771 035 $a(EBL)1730952 035 $a(OCoLC)884589683 035 $a(SSID)ssj0001239537 035 $a(PQKBManifestationID)11686696 035 $a(PQKBTitleCode)TC0001239537 035 $a(PQKBWorkID)11206683 035 $a(PQKB)11062289 035 $a(MiAaPQ)EBC1730952 035 $a(DE-He213)978-3-319-02556-8 035 $a(PPN)178781010 035 $a(EXLCZ)993710000000107771 100 $a20140502d2014 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aQC-LDPC Code-Based Cryptography /$fby Marco Baldi 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (128 p.) 225 1 $aSpringerBriefs in Electrical and Computer Engineering,$x2191-8112 300 $aDescription based upon print version of record. 311 $a3-319-02555-4 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aIntroduction -- Low-Density Parity-Check Codes -- Quasi-Cyclic Codes -- Quasi-Cyclic Low-Density Parity-Check Codes -- The McEliece and Niederreiter Cryptosystems -- QC-LDPC Code-based Cryptosystems. 330 $aThis book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes. In the first part of the book, the main characteristics of QC-LDPC codes are reviewed, and several techniques for their design are presented, while tools for assessing the error correction performance of these codes are also described. Some families of QC-LDPC codes that are best suited for use in cryptography are also presented. The second part of the book focuses on the McEliece and Niederreiter cryptosystems, both in their original forms and in some subsequent variants. The applicability of QC-LDPC codes in these frameworks is investigated by means of theoretical analyses and numerical tools, in order to assess their benefits and drawbacks in terms of system efficiency and security. Several examples of QC-LDPC code-based public key cryptosystems are presented, and their advantages over classical solutions are highlighted. The possibility of also using QC-LDPC codes in symmetric encryption schemes and digital signature algorithms is also briefly examined. 410 0$aSpringerBriefs in Electrical and Computer Engineering,$x2191-8112 606 $aElectrical engineering 606 $aCoding theory 606 $aInformation theory 606 $aComputer security 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aElectrical engineering. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer security. 615 14$aCommunications Engineering, Networks. 615 24$aCoding and Information Theory. 615 24$aSystems and Data Security. 676 $a005.82 700 $aBaldi$b Marco$4aut$4http://id.loc.gov/vocabulary/relators/aut$0521569 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299745303321 996 $aQC-LDPC Code-Based Cryptography$92075335 997 $aUNINA LEADER 01280nam2 22003013i 450 001 VAN00280545 005 20240827020612.280 017 70$2N$a9783050068930 100 $a20240827d2015 |0itac50 ba 101 $ager 102 $aDE 105 $a|||| ||||| 200 1 $aˆ1: ‰Zeugnisse und Kommentare$fKlaus Bringmann, Hans von Steuben editors 210 $a Berlin$cAkademie Verlag$d2015 215 $aIX, 604 p.$cill.$d24 cm 461 1$1001VAN00280546$12001 $aSchenkungen hellenistischer Herrscher an griechische Städte und Heiligtümer$1210 $aBerlin$cAkademie Verlag$1215 $avolumi$d24 cm$v1 620 $dBerlin$3VANL000066 702 1$aBringmann$bKlaus$3VANV023728 702 1$aSteuben$bHans von$3VANV233065 712 $aAkademie $3VANV232774$4650 801 $aIT$bSOL$c20240906$gRICA 856 4 $uhttps://doi.org/10.1524/9783050068930$zE-book ? Accesso al full-text attraverso riconoscimento IP di Ateneo, proxy e/o Shibboleth 899 $aBIBLIOTECA CENTRO DI SERVIZIO SBA$2VAN15 912 $fN 912 $aVAN00280545 950 $aBIBLIOTECA CENTRO DI SERVIZIO SBA$d15CONS SBA EBOOK 14426 $e15EB 14426 20240827 996 $aZeugnisse und Kommentare$94208365 997 $aUNICAMPANIA