Please use this identifier to cite or link to this item:
|Title:||Practical UMAC algorithms based on crypto code designs|
|Authors:||Korol O. G.|
Havrylova A. A.
Yevseiev S. P.
|Keywords:||UMAC hashing algorithm|
McElice crypto code constructions
|Citation:||Korol O. Practical UMAC algorithms based on crypto code designs / O. Korol, A. Havrylova, S. Yevseiev // Przetwarzanie, transmisja I bezpieczenstwo informacji : Wydawnictwo naukowe Akademii Techniczno-Humanistycznej w Bielsku-Bialej. – Bielskо-Bialа, 2019. – Tom 2. – S. 221–232.|
|Abstract:||A study was carried out on the use of an improved UMAC algorithm in post-quantum cryptography based on the formation of a substrate on the third layer of the hash code generation by the McElise crypto-code system on elliptic codes. The paper considers a practical algorithm for generating a hash code based on an example implementation of a cascading UMAC hash algorithm with the McElise crypto-code construction on elliptic codes. Using a crypto-code design allows you to save the universality of the hash code at the output of the algorithm, which allows its use in large databases as an identifier. In addition, in the context of the implementation of a full-scale quantum computer, US NIST experts consider crypto-code systems as one of the effective post-quantum cryptography algorithms. This approach allows you to implement the UMAC modification on various modifications of crypto-code structures and to ensure the formation of authentication profiles of different strength and length.|
|Appears in Collections:||Статті (КІТ)|
Files in This Item:
|Korol O. Practical UMAC algorithms based on crypto code designs.pdf||3,5 MB||Adobe PDF||View/Open|
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.