메뉴 건너뛰기




Volumn 68, Issue 5 2, 2003, Pages 561251-5612511

Analysis of common attacks in public-key cryptosystems based on low-density parity-check codes

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; APPROXIMATION THEORY; COMPUTATIONAL METHODS; HAMILTONIANS; ITERATIVE METHODS; MATHEMATICAL MODELS; PROBABILITY; SECURITY OF DATA; STATISTICAL MECHANICS;

EID: 0942289334     PISSN: 1063651X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (9)

References (19)
  • 14
    • 0033612060 scopus 로고    scopus 로고
    • Y. Iba J. Phys. A 32, 3875 (1999).
    • (1999) J. Phys. A , vol.32 , pp. 3875
    • Iba, Y.1
  • 15
    • 0009954696 scopus 로고    scopus 로고
    • edited by P. Sollich, A.C.C. Coolen, L.P. Hughston, and R.F. Streater, AIP Conf. Proc. 553 (AIP, Melville, New York)
    • H. Nishimori and D. Sherrington, in Disordered and Complex Systems, edited by P. Sollich, A.C.C. Coolen, L.P. Hughston, and R.F. Streater, AIP Conf. Proc. 553 (AIP, Melville, New York, 2001), p. 67.
    • (2001) Disordered and Complex Systems , pp. 67
    • Nishimori, H.1    Sherrington, D.2
  • 19
    • 33645079114 scopus 로고    scopus 로고
    • note
    • μj in Eq. (58), this effect is relatively small and the critical condition is determined mainly by K in Eq. (57).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.