000704776 000__ 02938cam\a2200469Ii\4500 000704776 001__ 704776 000704776 005__ 20230306135850.0 000704776 006__ m\\\\\o\\d\\\\\\\\ 000704776 007__ cr\un\nnnunnun 000704776 008__ 140512t20142014sz\a\\\\ob\\\\001\0\eng\d 000704776 0167_ $$a016727768$$2Uk 000704776 020__ $$a9783319025568 $$qelectronic book 000704776 020__ $$a3319025562 $$qelectronic book 000704776 020__ $$z9783319025551 000704776 0247_ $$a10.1007/978-3-319-02556-8$$2doi 000704776 035__ $$aSP(OCoLC)ocn879570345 000704776 035__ $$aSP(OCoLC)879570345 000704776 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dN$T$$dUKMGB$$dYDXCP$$dCOO 000704776 049__ $$aISEA 000704776 050_4 $$aTK5102.94 000704776 08204 $$a005.8/2$$223 000704776 1001_ $$aBaldi, Marco,$$eauthor. 000704776 24510 $$aQC-LDPC code-based cryptography /$$cMarco Baldi. 000704776 2463_ $$aQuasi-cyclic low-density parity-check codes 000704776 264_1 $$aCham :$$bSpringer,$$c[2014] 000704776 264_4 $$c©2014 000704776 300__ $$a1 online resource (xvi, 120 pages) :$$billustrations. 000704776 336__ $$atext$$btxt$$2rdacontent 000704776 337__ $$acomputer$$bc$$2rdamedia 000704776 338__ $$aonline resource$$bcr$$2rdacarrier 000704776 4901_ $$aSpringerBriefs in electrical and computer engineering,$$x2191-8112 000704776 504__ $$aIncludes bibliographical references and index. 000704776 506__ $$aAccess limited to authorized users. 000704776 520__ $$aThis book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes. In the first part of the book, the main characteristics of QC-LDPC codes are reviewed, and several techniques for their design are presented, while tools for assessing the error correction performance of these codes are also described. Some families of QC-LDPC codes that are best suited for use in cryptography are also presented. The second part of the book focuses on the McEliece and Niederreiter cryptosystems, both in their original forms and in some subsequent variants. The applicability of QC-LDPC codes in these frameworks is investigated by means of theoretical analyses and numerical tools, in order to assess their benefits and drawbacks in terms of system efficiency and security. Several examples of QC-LDPC code-based public key cryptosystems are presented, and their advantages over classical solutions are highlighted. The possibility of also using QC-LDPC codes in symmetric encryption schemes and digital signature algorithms is also briefly examined. 000704776 588__ $$aDescription based on online resource; title from PDF title page (SpringerLink, viewed May 12, 2014). 000704776 650_0 $$aPublic key cryptography. 000704776 650_0 $$aData encryption (Computer science) 000704776 830_0 $$aSpringerBriefs in electrical and computer engineering. 000704776 85280 $$bebk$$hSpringerLink 000704776 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://dx.doi.org/10.1007/978-3-319-02556-8$$zOnline Access 000704776 909CO $$ooai:library.usi.edu:704776$$pGLOBAL_SET 000704776 980__ $$aEBOOK 000704776 980__ $$aBIB 000704776 982__ $$aEbook 000704776 983__ $$aOnline 000704776 994__ $$a92$$bISE