Page 45 - ISCI’2017
P. 45

effective post-quantum algorithms  for cryptographic protection [37], confirms this  fact with a

            historical retrospective.


            This chapter includes the general theoretical  basics of the algebraic coding and a description of
            asymmetric cryptosystems based on these. Current state, existing contradictions and perspectives of

            practical use of the asymmetric code cryptosystems during post-quantum period were been studied.
            New crypto-transformation scheme, which significantly increases the relative data transfer rate, has

            proposed by the authors. An advantage of the proposed scheme in comparison with already known

            McEliece and Niederreiter schemes has shown [15, 16].



































































                                                                                                          45
   40   41   42   43   44   45   46   47   48   49   50