-
2
-
-
77952288288
-
A further improvement of the work factor in an attempt at breaking Mc Eliece's cryptosystem
-
A. Canteaut & H. Chabanne: A further improvement of the work factor in an attempt at breaking Mc Eliece's cryptosystem, Proceedings of Eurocode'94, (1994) 163-167
-
(1994)
Proceedings of Eurocode'94
, pp. 163-167
-
-
Canteaut, A.1
Chabanne, H.2
-
3
-
-
84947903754
-
On the Security Of Some Cryptosystems Based On Error-Correcting Codes
-
F. Chabaud: On the Security Of Some Cryptosystems Based On Error-Correcting Codes, Pre-proceedings of Eurocrypt'94, (1994) 127-135
-
(1994)
Pre-proceedings of Eurocrypt'94
, pp. 127-135
-
-
Chabaud, F.1
-
5
-
-
84990731886
-
How To Prove Yourself: Practiced Solutions to Identification and Signatures Problems
-
Lecture Notes in Computer Science
-
A. Fiat, A. Shamir: How To Prove Yourself: Practiced Solutions to Identification and Signatures Problems, Advances in Cryptology, Crypto'86, Lecture Notes in Computer Science 263, (1986) 186-194
-
(1986)
Advances in Cryptology, Crypto'86
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
6
-
-
85015223738
-
A (non-practical) three-pass identification protocol using coding theory
-
Lecture Notes in Computer Science
-
M. Giŕault: A (non-practical) three-pass identification protocol using coding theory, Advances in Cryptology, Auscrypt'90, Lecture Notes in Computer Science 453, (1990) 265-272
-
(1990)
Advances in Cryptology, Auscrypt'90
, vol.453
, pp. 265-272
-
-
Giŕault, M.1
-
8
-
-
84959165880
-
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
-
L.C. Guillou and J.-J. Quisquater: A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory, Advances in Cryptology, Eurocrypt'88, 330, (1988) 123-128
-
(1988)
Advances in Cryptology, Eurocrypt'88
, vol.330
, pp. 123-128
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
9
-
-
85015157728
-
A New Authentication Algorithm
-
Lecture Notes in Computer Science
-
S. Harari: A New Authentication Algorithm, Proceedings of Coding Theory and Applications, Lecture Notes in Computer Science 388, (1988) 91-105
-
(1988)
Proceedings of Coding Theory and Applications
, vol.388
, pp. 91-105
-
-
Harari, S.1
-
10
-
-
0024078914
-
A probabilistic algorithm for computing minimum weights of large error-correcting codes
-
J.S. Leon: A probabilistic algorithm for computing minimum weights of large error-correcting codes, IEEE Trans. Inform. Theory, IT-34(5): 1354-1359
-
IEEE Trans. Inform. Theory
, vol.IT-34
, Issue.5
, pp. 1354-1359
-
-
Leon, J.S.1
-
12
-
-
12344258539
-
Efficient signature generation by smart cards
-
C.P. Schnorr: Efficient signature generation by smart cards, Journal of Cryptology, 4, (1991) 161-174
-
(1991)
Journal of Cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, C.P.1
-
13
-
-
3342892176
-
A method for finding codewords of small weight
-
Lecture Notes in Computer Science
-
J. Stem: A method for finding codewords of small weight, Coding Theory and Applications, Lecture Notes in Computer Science 434, 173-180
-
Coding Theory and Applications
, vol.434
, pp. 173-180
-
-
Stem, J.1
-
14
-
-
84955595109
-
A new identification scheme based on syndrome decoding
-
Lecture Notes in Computer Science 773, Springer-Verlag
-
J. Stern: A new identification scheme based on syndrome decoding, Crypto'93, Lecture Notes in Computer Science 773, Springer-Verlag (1994) 13-21
-
(1994)
Crypto'93
, pp. 13-21
-
-
Stern, J.1
|