-
1
-
-
0017973512
-
On the inherent intractability of certain coding problems
-
May [BMT78]
-
[BMT78] E. R. Berlekamp, R. J. McEliece, and H. C. A. Vein Tilborg. On the inherent intractability of certain coding problems. IEEE Trans. Inform. Theory, IT-24(3): 384-386, May 1978.
-
(1978)
IEEE Trans. Inform. Theory
, vol.IT-24
, Issue.3
, pp. 384-386
-
-
Berlekamp, E.R.1
McEliece, R.J.2
Vein Tilborg, H.C.A.3
-
2
-
-
0028497993
-
Improved Girault identification scheme
-
sep [Che94]
-
[Che94] K. Chen. Improved Girault identification scheme. IEE Electronic Letters, 30(19): 1590-1591, sep 1994.
-
(1994)
IEE Electronic Letters
, vol.30
, Issue.19
, pp. 1590-1591
-
-
Chen, K.1
-
3
-
-
84955563711
-
A new identification algorithm
-
LNCS, 1996. [Che96]
-
[Che96] K. Chen. A new identification algorithm. In Cryptography Policy and Algorithms conference, volume 1029, pages 244-249. LNCS, 1996.
-
Cryptography Policy and Algorithms conference
, vol.1029
, pp. 244-249
-
-
Chen, K.1
-
4
-
-
84955612574
-
-
Rapport de recherche, Laboratoire d'Informatique de Ecole Poly technique, 91128 Palaiseau Cedex, France, in preparation. [CL96]
-
[CL96] F. Chabaud and R. Lercier. Zen: A new toolbox for finite extensions in finite fields. Rapport de recherche, Laboratoire d'Informatique de Ecole Poly technique, 91128 Palaiseau Cedex, France, 1996. in preparation.
-
(1996)
Zen: A new toolbox for finite extensions in finite fields
-
-
Chabaud, F.1
Lercier, R.2
-
5
-
-
84955597513
-
An efficient pseudo-random generator provably as secure as syndrome decoding
-
volume to appear. LNCS, [FS96]
-
[FS96] J.-B. Fischer and J. Stem. An efficient pseudo-random generator provably as secure as syndrome decoding. In Advances m Cryptology-EUROCRYPT '96, volume to appear. LNCS, 1996.
-
(1996)
Advances m Cryptology-EUROCRYPT '96
-
-
Fischer, J.-B.1
Stem, J.2
-
6
-
-
0021941233
-
Theory of codes with maximum rank distance
-
[Gab85]
-
[Gab85] E. M. Gabidulin. Theory of codes with maximum rank distance. Problems of Information Transmission, 21: 1-12, 1985.
-
(1985)
Problems of Information Transmission
, vol.21
, pp. 1-12
-
-
Gabidulin, E.M.1
-
7
-
-
85015223738
-
A (non practical) three-pass identification protocol using coding theory
-
LNCS, [Gir90]
-
[Gir90] M. Girault. A (non practical) three-pass identification protocol using coding theory. In Proc. Auscrypt'90, volume 453, pages 265-272. LNCS, 1990.
-
(1990)
Proc. Auscrypt'90
, vol.453
, pp. 265-272
-
-
Girault, M.1
-
8
-
-
84937409243
-
A new authentication algorithm
-
LNCS, [Har89]
-
[Har89] S. Harari. A new authentication algorithm. In Coding Theory and Applications, volume 388, pages 204-211. LNCS, 1989.
-
(1989)
Coding Theory and Applications
, vol.388
, pp. 204-211
-
-
Harari, S.1
-
11
-
-
84955557855
-
A new paradigm for public key identification
-
to be published. [Ste]
-
[Ste] J. Stem. A new paradigm for public key identification. IEEE Trans. Inform. Theory, to be published.
-
IEEE Trans. Inform. Theory
-
-
Stem, J.1
-
12
-
-
84955606497
-
An alternative to the Fiat-Shamir protocol
-
LNCS, [Ste90]
-
[Ste90] J. Stem. An alternative to the Fiat-Shamir protocol. In Advances in Cryptology-EUROCRYPT '89, pages 173-180. LNCS, 1990.
-
(1990)
Advances in Cryptology-EUROCRYPT '89
, pp. 173-180
-
-
Stem, J.1
-
13
-
-
84955595109
-
A new identification scheme based on syndrome decoding
-
LNCS, [Ste94]
-
[Ste94] J. Stern. A new identification scheme based on syndrome decoding. In Advances in Cryptology-CRYPTO '93, volume 773. LNCS, 1994.
-
(1994)
Advances in Cryptology-CRYPTO '93
, vol.773
-
-
Stern, J.1
-
14
-
-
84858239914
-
Cryptanalysis of Harari's identification scheme
-
LNCS, 1995. [Vér95a]
-
[Vér95a] P. Véron. Cryptanalysis of Harari's identification scheme. In Cryptography and Coding, volume 1025, pages 264-269. LNCS, 1995.
-
Cryptography and Coding
, vol.1025
, pp. 264-269
-
-
Véron, P.1
|