-
1
-
-
80052017185
-
Security-Related Comments Regarding McEliece's Public-Key Cryptosystem
-
Adams, C., and Meijer, H., „Security-Related Comments Regarding McEliece's Public-Key Cryptosystem," Advances in Cryptology-CRYPTO'87, Lecture notes in computer science (Springer-Verlag), pp. 224-228, 1988.
-
(1988)
Advances in Cryptology-Crypto'87
, pp. 224-228
-
-
Adams, C.1
Meijer, H.2
-
2
-
-
0024627373
-
Security-Related Comments Regarding McEliece's Public-Key Cryptosystem
-
Adams, C., and Meijer, H., „Security-Related Comments Regarding McEliece's Public-Key Cryptosystem," IEEE Transactions on Information Theory, Vol. 35, pp. 454-455, 1989.
-
(1989)
IEEE Transactions on Information Theory
, vol.35
, pp. 454-455
-
-
Adams, C.1
Meijer, H.2
-
3
-
-
84945119254
-
Optimal asymmetric encryption
-
Lecture notes in computer science 950 (Springer-Verlag)
-
Bellare, M., and Rogaway, P., „Optimal asymmetric encryption," Advances in Cryptology-EUROCRYPT'94, Lecture notes in computer science 950 (Springer-Verlag), pp. 232-249, 1994.
-
(1994)
Advances in Cryptology-Eurocrypt'94
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
0017973512
-
On the Inherent Intractability of Certain Coding Problems
-
Berlekamp, E.R., McEliece, R.J., and van Tilborg, H.C.A., „On the Inherent Intractability of Certain Coding Problems," IEEE Transactions on Information Theory, Vol. 24, pp. 384-386, 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, pp. 384-386
-
-
Berlekamp, E.R.1
McEliece, R.J.2
Van Tilborg, H.3
-
5
-
-
84958666890
-
Failure of the McEliece Public-Key Cryptosystem under Message-resend and Related-message Attack
-
Lecture notes in computer science (Springer-Verlag)
-
Berson, T.A., "Failure of the McEliece Public-Key Cryptosystem under Message-resend and Related-message Attack,,, Advances in Cryptology-CRYPTO'97, Lecture notes in computer science (Springer-Verlag), pp. 213-220, 1997.
-
(1997)
Advances in Cryptology-Crypto'97
, pp. 213-220
-
-
Berson, T.A.1
-
6
-
-
84949995981
-
An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information
-
Lecture notes in computer science (Springer-Verlag)
-
Blum, M., and Goldwasser, S., „An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information," Advances in Cryptology-CRYPTO'84, Lecture notes in computer science (Springer-Verlag), pp. 289-299, 1985..
-
(1985)
Advances in Cryptology-Crypto'84
, pp. 289-299
-
-
Blum, M.1
Goldwasser, S.2
-
7
-
-
0024012468
-
Cryptanalysis: A Survey of Recent Results
-
Brickell, E.F., and Odlyzko, A., „Cryptanalysis: A Survey of Recent Results," Proc.IEEE, 76, (5), pp. 153-165, 1988.
-
(1988)
" Proc.Ieee
, vol.76
, Issue.5
, pp. 153-165
-
-
Brickell, E.F.1
Odlyzko, A.2
-
8
-
-
84874800178
-
A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
ElGamal, T., „A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Trans., IT-31, (4), pp. 469-472, 1985.
-
(1985)
IEEE Trans
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
9
-
-
85050160774
-
Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information
-
Goldwasser, S., and Micali, S., „Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information," Proceedings of the 14th ACM Symposium on the Theory of Computing, pp. 270-299, 1982.
-
(1982)
Proceedings of the 14Th ACM Symposium on the Theory of Computing
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
12
-
-
0343515763
-
-
Technical Report, Katholieke University Leuven, Dept. Elektrotechniek
-
Jorissen, F., „A Security Evaluation of the Public-Key Cipher System Proposed by McEliece, used as a combined scheme," Technical Report, Katholieke University Leuven, Dept. Elektrotechniek, Jan 1986.
-
(1986)
A Security Evaluation of the Public-Key Cipher System Proposed by Mceliece, Used as a Combined Scheme
-
-
Jorissen, F.1
-
13
-
-
84969335380
-
Cryptanalysis of McEliece's Public-Key Cryptosystem
-
Lecture notes in computer science (Springer-Verlag)
-
Korzhik, V.I., and Turkin, A.I., „Cryptanalysis of McEliece's Public-Key Cryptosystem", Advances in Cryptology-EUROCRYPT'91, Lecture notes in computer science (Springer-Verlag), pp. 68-70, 1991.
-
(1991)
Advances in Cryptology-Eurocrypt'91
, pp. 68-70
-
-
Korzhik, V.I.1
Turkin, A.I.2
-
14
-
-
85034651324
-
An observation on the security of McEliece's Public-Key Cryptosystem
-
Lecture notes in computer science (Springer-Verlag)
-
Lee, P.J., and Brickell, E.F., „An observation on the security of McEliece's Public-Key Cryptosystem," Advances in Cryptology-EUROCRYPT'88, Lecture notes in computer science (Springer-Verlag), pp. 275-280, 1988.
-
(1988)
Advances in Cryptology-Eurocrypt'88
, pp. 275-280
-
-
Lee, P.J.1
Brickell, E.F.2
-
15
-
-
0025699575
-
Information Rate of McEliece's Public-Key Cryptosystem
-
Lin, M.C., and Fu, H.L., „Information Rate of McEliece's Public-Key Cryptosystem," Electronics Letters, Vol. 26, No. 1, pp. 16-18, 1990.
-
(1990)
Electronics Letters
, vol.26
, Issue.1
, pp. 16-18
-
-
Lin, M.C.1
Fu, H.L.2
-
16
-
-
0002448405
-
A Public-Key Cryptosystem Based on Algebraic Coding Theory
-
McEliece, R.J., „A Public-Key Cryptosystem Based on Algebraic Coding Theory," DSN Progress Report, 42-44, pp. 114-116, 1978.
-
(1978)
DSN Progress Report
, vol.42-44
, pp. 114-116
-
-
McEliece, R.J.1
-
17
-
-
77956030789
-
NBS FIPS PUB 46, „Data Encryption Standard
-
U.S. Department of Commerce, Jan
-
National Bureau of Standards, NBS FIPS PUB 46, „Data Encryption Standard," National Bureau of Standards, U.S. Department of Commerce, Jan 1977.
-
(1977)
National Bureau of Standards
-
-
-
18
-
-
0024752648
-
Improving Code Rate of McEliece's public-Key Cryptosystem
-
Park, C.S., „Improving Code Rate of McEliece's public-Key Cryptosystem," Electronics Letters, Vol. 25, No. 21, pp. 1466-1467, 1989.
-
(1989)
Electronics Letters
, vol.25
, Issue.21
, pp. 1466-1467
-
-
Park, C.S.1
-
19
-
-
0003614758
-
Digital Signatures and Public-Key Functions as Intractable as Factorization
-
Technical Report, MIT/LCS/, Jan
-
Rabin, M.O., „Digital Signatures and Public-Key Functions as Intractable as Factorization," MIT Lab. For Computer Science, Technical Report, MIT/LCS/TR-212, Jan 1979.
-
(1979)
MIT Lab. For Computer Science
, vol.TR-212
-
-
Rabin, M.O.1
-
21
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
Rivest, R.L., Shamir, A., and Adleman, L.M., „A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, 21, (2), pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
23
-
-
84455184676
-
„Efficient Generation of Binary Words of Given Weight
-
(Springer-Verlag)
-
Sendrier, N., „Efficient Generation of Binary Words of Given Weight," Cryptography and Coding: 5th IMA Conference, (Springer-Verlag), pp. 184-187, 1995.
-
(1995)
Cryptography and Coding: 5Th IMA Conference
, pp. 184-187
-
-
Sendrier, N.1
-
24
-
-
38149145758
-
Key Generation of Algebraic-Code Cryptosystems
-
Sun, H.M., and Hwang, T., „Key Generation of Algebraic-Code Cryptosystems", Computers and Mathematics with Applications, 27, (2), pp. 99-106, 1994.
-
(1994)
Computers and Mathematics with Applications
, vol.27
, Issue.2
, pp. 99-106
-
-
Sun, H.M.1
Hwang, T.2
-
25
-
-
85031802472
-
On the McEliece Public-Key Cryptosystem
-
Lecture notes in computer science (Springer-Verlag)
-
van Tilburg, J., „On the McEliece Public-Key Cryptosystem," Advances in Cryptology-CRYPTO'88, Lecture notes in computer science (Springer-Verlag), pp. 119-131, 1990.
-
(1990)
Advances in Cryptology-Crypto'88
, pp. 119-131
-
-
Van Tilburg, J.1
|