-
1
-
-
0002448405
-
A Public-Key Cryptosystem Based on Algebraic Coding Theory
-
McEliece, R.J., “A Public-Key Cryptosystem Based on Algebraic Coding Theory,” DSN Progress Report, 42-44 (1978) 114-116
-
(1978)
DSN Progress Report
, vol.42-44
, pp. 114-116
-
-
McEliece, R.J.1
-
2
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
Rivest, R.L., Shamir, A., and Adleman, L.M., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM 21 (2) (1978) 120-126
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
3
-
-
84874800178
-
A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
ElGamal, T., “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Trans. IT-31 (4) (1985) 469-472
-
(1985)
IEEE Trans. IT-31 (4)
, pp. 469-472
-
-
Elgamal, T.1
-
4
-
-
84969335380
-
Cryptanalysis of McEliece’s Public-Key Cryptosystem
-
Lecture Notes in Computer Science, Springer- Verlag
-
Korzhik, V.I., and Turkin, A.I., “Cryptanalysis of McEliece’s Public-Key Cryptosystem”, Advances in Cryptology-EUROCRYPT’91, Lecture Notes in Computer Science, Springer- Verlag (1991) 68-70
-
(1991)
Advances in Cryptology-EUROCRYPT’91
, pp. 68-70
-
-
Korzhik, V.I.1
Turkin, A.I.2
-
5
-
-
84958666890
-
Failure of the McEliece Public-Key Cryptosystem under Message-resend and Related-message Attack
-
Springer-Verlag
-
Berson, T.A., “Failure of the McEliece Public-Key Cryptosystem under Message-resend and Related-message Attack,” Advances in Cryptology-CRYPTO’97, Lecture Notes in Computer Science, Vol. 1294. Springer-Verlag (1997) 213-220
-
(1997)
Advances in Cryptology-CRYPTO’97, Lecture Notes in Computer Science
, vol.1294
, pp. 213-220
-
-
Berson, T.A.1
-
6
-
-
0038554343
-
-
Lecture Notes in Computer Science, Springer-Verlag
-
Rao, T.R.N., and Nam, K.H., “Private-Key Algebraic-Coded Cryptosystems,” Advances in Cryptology-CRYPTO’86, Lecture Notes in Computer Science, Springer-Verlag (1987) 3548
-
(1987)
Private-Key Algebraic-Coded Cryptosystems, Advances in Cryptology-CRYPTO’86
, pp. 3548
-
-
Rao, T.1
Nam, K.H.2
-
7
-
-
0024705818
-
Private-Key Algebraic-Code Encryption,”
-
Rao, T.R.N., and Nam, K.H., “Private-Key Algebraic-Code Encryption,” IEEE Trans., IT- 35 (4) (1987) 829-833
-
(1987)
IEEE Trans
, vol.IT- 35
, Issue.4
, pp. 829-833
-
-
Rao, T.1
Nam, K.H.2
-
9
-
-
84956862729
-
-
Lecture Notes in Computer Science, Springer-Verlag
-
Struik, R., and Tilburg, J., “The Rao-Nam Scheme Is Insecure Against a Chosen-Plaintext Attack,” Advances in Cryptology-CRYPTO’87, Lecture Notes in Computer Science, Springer-Verlag (1988) 445-457
-
(1988)
The Rao-Nam Scheme is Insecure against a Chosen-Plaintext Attack, Advances in Cryptology-CRYPTO’87
, pp. 445-457
-
-
Struik, R.1
Tilburg, J.2
-
10
-
-
0024012468
-
Cryptanalysis: A Survey of Recent Results
-
Brickell, E.F., and Odlyzko, A., “Cryptanalysis: A Survey of Recent Results,” Proc. IEEE 76 (5) (1988) 153-165
-
(1988)
Proc. IEEE
, vol.76
, Issue.5
, pp. 153-165
-
-
Brickell, E.F.1
Odlyzko, A.2
-
11
-
-
0346884975
-
-
Ph.D. Dissertation, The Center for Advanced Computer Studies, University of Southwestern Louisiana, Lafayette
-
Denny, W.F., “Encryptions Using Linear and Non-Linear Codes: Implementation and Security Considerations,” Ph.D. Dissertation, The Center for Advanced Computer Studies, University of Southwestern Louisiana, Lafayette (1988)
-
(1988)
Encryptions Using Linear and Non-Linear Codes: Implementation and Security Considerations
-
-
Denny, W.F.1
-
13
-
-
0027252291
-
Private-Key Burst Correcting Code Encryption, in Proc. Of the 1993
-
Alencar, F.M.R., Leo, A.M.P., and Campello de Souza, R.M., “Private-Key Burst Correcting Code Encryption,” in Proc. of the 1993 IEEE Int. Symp. Information Theory (1993) 227
-
(1993)
IEEE Int. Symp. Information Theory
, pp. 227
-
-
Alencar, F.1
Leo, A.2
Campello de Souza, R.M.3
-
14
-
-
0028496270
-
Array Codes for Private-Key Encryption
-
Campello de Souza, R.M., and Campello de Souza, J., “Array Codes for Private-Key Encryption,” Electronics Letters 30 (17) (1994) 1394-1396
-
(1994)
Electronics Letters
, vol.30
, Issue.17
, pp. 1394-1396
-
-
Campello de Souza, R.M.1
Campello de Souza, J.2
-
16
-
-
0030287972
-
Security of Private-Key Encryption Based on Array Codes
-
A1 Jabri, A., “Security of Private-Key Encryption Based on Array Codes”, Electronics Letters 32 (24) (1996) 2226-2227
-
(1996)
Electronics Letters
, vol.32
, Issue.24
, pp. 2226-2227
-
-
A1 Jabri, A.1
-
20
-
-
38149145758
-
Key Generation of Algebraic-Code Cryptosystems
-
Sun, H.M., and Hwang, T., “Key Generation of Algebraic-Code Cryptosystems”, Computers and Mathematics with Applications 27 (2) (1994) 99-106
-
(1994)
Computers and Mathematics with Applications
, vol.27
, Issue.2
, pp. 99-106
-
-
Sun, H.M.1
Hwang, T.2
|