-
1
-
-
0001949079
-
Complexity issues in coding theory
-
Pless, V.S, Huffman, W.C, eds, I, pp, North-Holland, Amsterdam
-
Barg, A.: Complexity issues in coding theory. In: Pless, V.S., Huffman, W.C. (eds.) Handbook of Coding theory, eh. 7, vol. I, pp. 649-754. North-Holland, Amsterdam (1998)
-
(1998)
Handbook of Coding theory, eh
, vol.7
, pp. 649-754
-
-
Barg, A.1
-
2
-
-
84948986458
-
Optimal asymetric encryption
-
De Santis, A, ed, EUROCRYPT, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Optimal asymetric encryption. In: De Santis, A. (ed.) EUROCRYPT 1994."LNCS, vol. 950, pp. 92-111. Springer, Heidelberg (1995)
-
(1994)
LNCS
, vol.950
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
84968518238
-
Factoring polynomials over large finite fields
-
Berlekamp, E.R.: Factoring polynomials over large finite fields. Mathematics of Computation 24(111), 713-715 (1970)
-
(1970)
Mathematics of Computation
, vol.24
, Issue.111
, pp. 713-715
-
-
Berlekamp, E.R.1
-
4
-
-
0017973512
-
On the inherent intractability of certain coding problems
-
May
-
Berlekamp, E.R., McEliece, R.J., van Tilborg, H.C.: On the inherent intractability of certain coding problems. IEEE Transactions on Information Theory 24(3) (May 1978)
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.3
-
-
Berlekamp, E.R.1
McEliece, R.J.2
van Tilborg, H.C.3
-
5
-
-
84958666890
-
Failure of the McEliece public-key cryptosystem under message-resend and related-message attack
-
Kalisky, B, ed, CRYPTO 1997, Springer, Heidelberg
-
Berson, T.: Failure of the McEliece public-key cryptosystem under message-resend and related-message attack. In: Kalisky, B. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 213-220. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 213-220
-
-
Berson, T.1
-
6
-
-
0031675932
-
A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
-
Canteaut, A., Chabaud, F.: A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511. IEEE Transactions on Information Theory 44(1), 367-378 (1998)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.1
, pp. 367-378
-
-
Canteaut, A.1
Chabaud, F.2
-
7
-
-
84947809062
-
Cryptanalysis of the original McEliece cryptosystem
-
Ohta, K, Pei, D, eds, ASIACRYPT 1998, Springer, Heidelberg
-
Canteaut, A., Sendrier, N.: Cryptanalysis of the original McEliece cryptosystem. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 187-199. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1514
, pp. 187-199
-
-
Canteaut, A.1
Sendrier, N.2
-
10
-
-
0030871521
-
Factoring polynomials using binary representations of finite fields
-
Ganz, J.: Factoring polynomials using binary representations of finite fields. IEEE Transactions on Information Theory 43(1), 147-153 (1997)
-
(1997)
IEEE Transactions on Information Theory
, vol.43
, Issue.1
, pp. 147-153
-
-
Ganz, J.1
-
11
-
-
84958629363
-
Reaction attacks against several public-key cryptosystems
-
Varadharajan, V, Mu, Y, eds, ICICS 1999, Springer, Heidelberg
-
Hall, C., Goldberg, I., Schneier, B.: Reaction attacks against several public-key cryptosystems. In: Varadharajan, V., Mu, Y. (eds.) ICICS 1999. LNCS, vol. 1726, pp. 2-12. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1726
, pp. 2-12
-
-
Hall, C.1
Goldberg, I.2
Schneier, B.3
-
12
-
-
84937393537
-
-
Kobara, K., Imai, H.: Semantically secure McEliece public-key cryptosystems - Conversions for McEliece PKC. In: Kim, K. (ed.) PKC 2001. LNCS,1992, pp. 19-35. Springer, Heidelberg (2001)
-
Kobara, K., Imai, H.: Semantically secure McEliece public-key cryptosystems - Conversions for McEliece PKC. In: Kim, K. (ed.) PKC 2001. LNCS,"vol. 1992, pp. 19-35. Springer, Heidelberg (2001)
-
-
-
-
13
-
-
56749148587
-
-
McEliece, R.J.: A public-key ciyptosystem based on algebraic coding theory. In: DSN Prog. Rep., Jet Prop. Lab., California Inst. Technol., Pasadena, CA, pp. 114-116 (January 1978)
-
McEliece, R.J.: A public-key ciyptosystem based on algebraic coding theory. In: DSN Prog. Rep., Jet Prop. Lab., California Inst. Technol., Pasadena, CA, pp. 114-116 (January 1978)
-
-
-
-
15
-
-
84957795480
-
-
Pointcheval, D.: Chosen-ciphertext security for any one-way cryptosystem. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, 1751, pp. 129-146. Springer, Heidelberg (2000)
-
Pointcheval, D.: Chosen-ciphertext security for any one-way cryptosystem. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 129-146. Springer, Heidelberg (2000)
-
-
-
-
16
-
-
0034226112
-
Finding the permutation between equivalent codes: The support splitting algorithm
-
Sendrier, N.: Finding the permutation between equivalent codes: the support splitting algorithm. IEEE Transactions on Information Theory 46(4), 1193-1203 (2000)
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1193-1203
-
-
Sendrier, N.1
-
17
-
-
56749098593
-
Cryptosystèmes à clé publique basés sur les codes correcteurs d'erreurs. Mémoire d'habilitation à diriger des recherches
-
March
-
Sendrier, N.: Cryptosystèmes à clé publique basés sur les codes correcteurs d'erreurs. Mémoire d'habilitation à diriger des recherches, Université Paris 6 (March 2002)
-
(2002)
Université Paris
, vol.6
-
-
Sendrier, N.1
-
18
-
-
56749098594
-
-
Sendrier, N.: Encoding information into constant weight words. In: IEEE Conference, ISIT 2005, pp. 435-438, Adelaide, Australia (September 2005)
-
Sendrier, N.: Encoding information into constant weight words. In: IEEE Conference, ISIT 2005, pp. 435-438, Adelaide, Australia (September 2005)
-
-
-
-
19
-
-
0033885534
-
Further cryptanalysis of the McEliece public-key cryptosystem
-
Sun, H.M.: Further cryptanalysis of the McEliece public-key cryptosystem. IEEE Trans. on communication letters 4(1), 18-19 (2000)
-
(2000)
IEEE Trans. on communication letters
, vol.4
, Issue.1
, pp. 18-19
-
-
Sun, H.M.1
|