-
1
-
-
80052017185
-
Security-Related Comments Regarding McEliece's Public-Key Cryptosystem
-
Springer-Verlag
-
C. M. Adams, H. Meijer, "Security-Related Comments Regarding McEliece's Public-Key Cryptosystem," Advances in Cryptology— Proceedings of CRYPTO '87, Springer-Verlag, 1988, pp.224-230.
-
(1988)
Advances in Cryptology— Proceedings of CRYPTO '87
, pp. 224-230
-
-
Adams, C.M.1
Meijer, H.2
-
2
-
-
0030679849
-
"A Public-Key Cryptosystem with WorstCase/Average-CaseEquivalence
-
M. Ajtai, C. Dwork, "A Public-Key Cryptosystem with WorstCase/Average-Case Equivalence," In 29th ACM Symposium on Theory of Computing, 1997, pp. 284-293.
-
(1997)
29Th ACM Symposium on Theory of Computing
, pp. 284-293
-
-
Ajtai, M.1
Dwork, C.2
-
3
-
-
84958635562
-
-
paper presented at the 1967 International Symposium on Information Theory, San Remo, Italy
-
E.R. Berlekamp, "Nonbinary BCH Decoding," paper presented at the 1967 International Symposium on Information Theory, San Remo, Italy.
-
Nonbinary BCH Decoding
-
-
Berlekamp, E.R.1
-
5
-
-
0015669546
-
Goppa Codes
-
E.R. Berlekamp, "Goppa Codes," IEEE Transactions on Information Theory, Vol. IT-19, No. 5, pp. 590-592, September 1973.
-
(1973)
IEEE Transactions on Information Theory
, vol.19
, Issue.5
, pp. 590-592
-
-
Berlekamp, E.R.1
-
6
-
-
0017973512
-
On the Inherent Intractability of Certain Coding Problems
-
E.R. Berlekamp, R.J. McEliece, H. van Tilborg, "On the Inherent Intractability of Certain Coding Problems," IEEE Transactions on Information Theory, Vol. 24, 1978, pp. 384-386.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, pp. 384-386
-
-
Berlekamp, E.R.1
McEliece, R.J.2
Van Tilborg, H.3
-
7
-
-
84958666890
-
Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack
-
Springer-Verlag
-
T. Berson, "Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack," Advances in Crypto-logy—CRYPTO '97 Proceedings, Springer-Verlag, 1997, pp. 213-220.
-
(1997)
Advances in Crypto-logy—CRYPTO '97 Proceedings
, pp. 213-220
-
-
Berson, T.1
-
8
-
-
84958598719
-
Eliminating Errors in the Ajtai-Dwork Cryptosystem
-
Springer-Verlag
-
O. Goldreich, S. Goldwasser, S. Halevi, "Eliminating Errors in the Ajtai-Dwork Cryptosystem," Advances in Cryptology—CRYPTO '97 Proceedings, Springer-Verlag, 1997, pp. 105-111.
-
(1997)
Advances in Cryptology—CRYPTO '97 Proceedings
, pp. 105-111
-
-
Goldreich, O.1
Goldwasser, S.2
Halevi, S.3
-
10
-
-
0026765268
-
-
L. Harn, D.C. Wang, "Cryptanalysis and Modification of Digital Signature Scheme Based on Error-Correcting Codes," Electronics Letters, v. 28, n. 2, 10 Jan 1992, p. 157-159.
-
-
-
Harn, L.1
Wang, D.C.2
-
11
-
-
84859947652
-
A Variant of a Public-Key Cryptosystem Based on Goppa Codes
-
J.P. Jordan, "A Variant of a Public-Key Cryptosystem Based on Goppa Codes," Sigact News, 1983, pp. 61-66.
-
(1983)
Sigact News
, pp. 61-66
-
-
Jordan, J.P.1
-
13
-
-
85034651324
-
An Observation on the Security of McEliece's Public-Key Cryptosystem
-
Springer-Verlag
-
P.J. Lee, E.F. Brickell, "An Observation on the Security of McEliece's Public-Key Cryptosystem," Advances in Cryptology—EUROCRYPT 88 Proceedings, Springer-Verlag, 1988, pp. 275-280.
-
(1988)
Advances in Cryptology—EUROCRYPT 88 Proceedings
, pp. 275-280
-
-
Lee, P.J.1
Brickell, E.F.2
-
14
-
-
0028294826
-
On the Equivalence of McEliece's and Niederreiter's Public-Key Cryptosystems
-
Y.X. Li, R.H. Deng, X.M. Wang, "On the Equivalence of McEliece's and Niederreiter's Public-Key Cryptosystems," IEEE Transactions on Information Theory, Vol. 40, 1994, pp. 271-273.
-
(1994)
IEEE Transactions on Information Theory
, vol.40
, pp. 271-273
-
-
Li, Y.X.1
Deng, R.H.2
Wang, X.M.3
-
15
-
-
84937740421
-
Shift Register Synthesis and BCH Decoding
-
J.L. Massey, "Shift Register Synthesis and BCH Decoding," IEEE Transactions on Information Theory, Vol. IT-15, No. 1, pp. 122-127, Jan. 1969.
-
(1969)
IEEE Transactions on Information Theory
, vol.15
, Issue.1
, pp. 122-127
-
-
Massey, J.L.1
-
16
-
-
0003777826
-
A Public-Key Cryptosystem Based on Algebraic Coding Theory
-
Jet Propulsion Laboratory, California Institute of Technology
-
R.J. McEliece, "A Public-Key Cryptosystem Based on Algebraic Coding Theory," Deep Space Network Progress Report 42-44, Jet Propulsion Laboratory, California Institute of Technology, 1978, pp. 104-113.
-
(1978)
Deep Space Network Progress Report 42-44
, pp. 104-113
-
-
McEliece, R.J.1
-
17
-
-
0022582790
-
Knapsack-Type Cryptosystems and Algebraic Coding Theory
-
H. Niederreiter, "Knapsack-Type Cryptosystems and Algebraic Coding Theory," Problems of Control and Information Theory, v. 15, n. 2, 1986, pp. 159-166.
-
(1986)
Problems of Control and Information Theory
, vol.15
, Issue.2
, pp. 159-166
-
-
Niederreiter, H.1
-
18
-
-
0016487667
-
-
N.J. Patterson, "The Algebraic Decoding of Goppa Codes," IEEE Transactions on Information Theory, Vol. IT-21, No. 2, pp. 203-207, March 1975.
-
-
-
Patterson, N.J.1
-
19
-
-
84958676432
-
-
presented at the IEEE Int. Symp. Information Theory, Notre Dame, Ind., Oct. 27-31
-
Y. Sugiyama, M. Kasahara, S. Hirasawa, T. Namekawa, "A method for solving the key equation for decoding Goppa codes," presented at the IEEE Int. Symp. Information Theory, Notre Dame, Ind., Oct. 27-31, 1974.
-
(1974)
A Method for Solving the Key Equation for Decoding Goppa Codes
-
-
Sugiyama, Y.1
Kasahara, M.2
Hirasawa, S.3
Namekawa, T.4
-
20
-
-
0016927995
-
An Erasures-and-Errors Decoding Algorithm for Goppa Codes
-
Y. Sagiyama, M. Kasahara, S. Hirasawa, T. Namekawa, "An Erasures-and-Errors Decoding Algorithm for Goppa Codes," IEEE Transactions on Information Theory, pp. 238-241, March 1976.
-
(1976)
IEEE Transactions on Information Theory
, pp. 238-241
-
-
Sagiyama, Y.1
Kasahara, M.2
Hirasawa, S.3
Namekawa, T.4
-
21
-
-
85031802472
-
-
J. van Tilburg, "On the McEliece Cryptosystem," Advances in Cryptology—CRYPTO '88 Proceedings, Springer-Verlag, 1990, pp. 119-131.
-
-
-
Van Tilburg, J.1
|