LEADER 03897nam 22006975 450 001 9910299745303321 005 20200704025642.0 010 $a3-319-02556-2 024 7 $a10.1007/978-3-319-02556-8 035 $a(CKB)3710000000107771 035 $a(EBL)1730952 035 $a(OCoLC)884589683 035 $a(SSID)ssj0001239537 035 $a(PQKBManifestationID)11686696 035 $a(PQKBTitleCode)TC0001239537 035 $a(PQKBWorkID)11206683 035 $a(PQKB)11062289 035 $a(MiAaPQ)EBC1730952 035 $a(DE-He213)978-3-319-02556-8 035 $a(PPN)178781010 035 $a(EXLCZ)993710000000107771 100 $a20140502d2014 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aQC-LDPC Code-Based Cryptography /$fby Marco Baldi 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (128 p.) 225 1 $aSpringerBriefs in Electrical and Computer Engineering,$x2191-8112 300 $aDescription based upon print version of record. 311 $a3-319-02555-4 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aIntroduction -- Low-Density Parity-Check Codes -- Quasi-Cyclic Codes -- Quasi-Cyclic Low-Density Parity-Check Codes -- The McEliece and Niederreiter Cryptosystems -- QC-LDPC Code-based Cryptosystems. 330 $aThis book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes. In the first part of the book, the main characteristics of QC-LDPC codes are reviewed, and several techniques for their design are presented, while tools for assessing the error correction performance of these codes are also described. Some families of QC-LDPC codes that are best suited for use in cryptography are also presented. The second part of the book focuses on the McEliece and Niederreiter cryptosystems, both in their original forms and in some subsequent variants. The applicability of QC-LDPC codes in these frameworks is investigated by means of theoretical analyses and numerical tools, in order to assess their benefits and drawbacks in terms of system efficiency and security. Several examples of QC-LDPC code-based public key cryptosystems are presented, and their advantages over classical solutions are highlighted. The possibility of also using QC-LDPC codes in symmetric encryption schemes and digital signature algorithms is also briefly examined. 410 0$aSpringerBriefs in Electrical and Computer Engineering,$x2191-8112 606 $aElectrical engineering 606 $aCoding theory 606 $aInformation theory 606 $aComputer security 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aElectrical engineering. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer security. 615 14$aCommunications Engineering, Networks. 615 24$aCoding and Information Theory. 615 24$aSystems and Data Security. 676 $a005.82 700 $aBaldi$b Marco$4aut$4http://id.loc.gov/vocabulary/relators/aut$0521569 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299745303321 996 $aQC-LDPC Code-Based Cryptography$92075335 997 $aUNINA