Polar code-based cryptosystem: comparative study and analysis of efficiency
Abstract
This review paper aims to examine the use of polar codes in public key cryptosystems, providing a comprehensive overview of the state-of-the-art in this field at present. This study thoroughly searches databases such as IEEE Xplore, Scopus, and the ACM digital library to locate relevant research articles. In this study, we demonstrate the use of polar codes in public key cryptography and provide valuable insights for researchers interested in this field of research. The paper identifies several areas for further research and development, such as improved security and reliability of polar code-based cryptosystems. An analysis of the review highlights the major challenges and open research questions in this area, including the need for efficient key generation algorithms and the trade-offs between security and performance. An analysis of various existing encryption techniques as well as their security proofs is provided in the tables.
Keywords
Full Text:
PDFDOI: http://doi.org/10.11591/ijeecs.v32.i2.pp804-810
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)
p-ISSN: 2502-4752, e-ISSN: 2502-4760
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).