Statements (68)
Predicate | Object |
---|---|
gptkbp:instanceOf |
error-correcting code
|
gptkbp:basedOn |
Goppa codes
|
gptkbp:characterizedBy |
large key sizes
|
gptkbp:has |
a public key
|
gptkbp:hasAppearedIn |
quantum_attacks
|
gptkbp:hasRelatedPatent |
secure communications
|
https://www.w3.org/2000/01/rdf-schema#label |
McEliece coding scheme
|
gptkbp:introduced |
1978
|
gptkbp:inventor |
gptkb:Robert_McEliece
|
gptkbp:isAttendedBy |
government agencies
|
gptkbp:isAvailableIn |
secure messaging applications
|
gptkbp:isAvenueFor |
security vulnerabilities
computational complexity error correction performance |
gptkbp:isBasedOn |
algebraic geometry codes
|
gptkbp:isConsidered |
secure data storage
satellite communications secure data transmission secure network protocols a candidate for standardization |
gptkbp:isDiscussedIn |
conferences
academic papers |
gptkbp:isEvaluatedBy |
performance metrics
performance efficiency performance standards other coding schemes |
gptkbp:isExploredIn |
data integrity
data privacy information security quantum_computing_research |
gptkbp:isLocatedIn |
software libraries
various cryptographic protocols |
gptkbp:isNotableFor |
low-latency applications
its efficiency in decoding |
gptkbp:isNotedFor |
its robustness
|
gptkbp:isPartOf |
modern cryptography
cryptographic systems Reed-Solomon codes LDPC codes Turbo codes classical coding schemes error correction coding family error correction research |
gptkbp:isPromotedBy |
educational programs
cryptography communities |
gptkbp:isReflectedIn |
industry standards
patents research funding |
gptkbp:isStudiedIn |
network security
coding theory error detection capabilities |
gptkbp:isSupportedBy |
academic research
|
gptkbp:isTestedFor |
robustness against attacks
|
gptkbp:isTrainedIn |
real-world applications
error models |
gptkbp:isUsedFor |
data encoding
|
gptkbp:isUsedIn |
data transmission systems
|
gptkbp:isUtilizedIn |
information theory
IoT security wireless communications cloud computing security network coding cryptographic analysis. cryptographic benchmarks |
gptkbp:isVisitedBy |
various researchers
|
gptkbp:provides |
error correction capabilities
|
gptkbp:requires |
field arithmetic
|
gptkbp:usedIn |
post-quantum cryptography
|