2022
DOI: 10.1504/ijics.2022.125276
|View full text |Cite
|
Sign up to set email alerts
|

Robust message authentication in the context of quantum key distribution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…To improve the security, an irreducible polynomial will be randomly generated as the characteristic polynomial in this study. If there is one entry in the higher 64 bits of the generated characteristic polynomial, the Toeplitz matrix will not be able to complete all the operations in a single cycle, which will considerably slow down the hash operation [ 20 , 21 , 22 , 23 ].…”
Section: Implementation Flow Of Hashing Algorithm Based On Variable C...mentioning
confidence: 99%
“…To improve the security, an irreducible polynomial will be randomly generated as the characteristic polynomial in this study. If there is one entry in the higher 64 bits of the generated characteristic polynomial, the Toeplitz matrix will not be able to complete all the operations in a single cycle, which will considerably slow down the hash operation [ 20 , 21 , 22 , 23 ].…”
Section: Implementation Flow Of Hashing Algorithm Based On Variable C...mentioning
confidence: 99%