McEliece Cryptosystem Implementation: Theory and Practice
暂无分享,去创建一个
[1] Alfredo De Santis,et al. Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.
[2] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[3] E. Berlekamp. Factoring polynomials over large finite fields* , 1970, SYMSAC '71.
[4] Kazuo Ohta,et al. Advances in Cryptology — ASIACRYPT’98 , 2002, Lecture Notes in Computer Science.
[5] Vijay Varadharajan,et al. Information and Communication Security , 1999, Lecture Notes in Computer Science.
[6] Thomas M. Cover,et al. Enumerative source encoding , 1973, IEEE Trans. Inf. Theory.
[7] Elwyn R. Berlekamp,et al. On the inherent intractability of certain coding problems (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[8] Jürgen Ganz,et al. Factoring polynomials using binary representations of finite fields , 1997, IEEE Trans. Inf. Theory.
[9] Alexander Barg,et al. Complexity Issues in Coding Theory , 1997, Electron. Colloquium Comput. Complex..
[10] Mihir Bellare,et al. Optimal Asymmetric Encryption , 1994, EUROCRYPT.
[11] Hung-Min Sun. Further cryptanalysis of the McEliece public-key cryptosystem , 2000, IEEE Communications Letters.
[12] Kazukuni Kobara,et al. Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC , 2001, Public Key Cryptography.
[13] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[14] Bruce Schneier,et al. Reaction Attacks against several Public-Key Cryptosystems , 1999, ICICS.
[15] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[16] Anne Canteaut,et al. A New Algorithm for Finding Minimum-Weight Words in a Linear Code: Application to McEliece’s Cryptosystem and to Narrow-Sense BCH Codes of Length , 1998 .
[17] David Pointcheval,et al. Chosen-Ciphertext Security for Any One-Way Cryptosystem , 2000, Public Key Cryptography.
[18] Matthieu Finiasz,et al. Nouvelles constructions utilisant des codes correcteurs d'erreurs en cryptographie à clef publique , 2004 .
[19] Anne Canteaut,et al. Cryptanalysis of the Original McEliece Cryptosystem , 1998, ASIACRYPT.
[20] Nicolas Sendrier,et al. Finding the permutation between equivalent linear codes: The support splitting algorithm , 2000, IEEE Trans. Inf. Theory.
[21] Nicolas Sendrier,et al. Encoding information into constant weight words , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[22] Thomas A. Berson,et al. Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack , 1997, CRYPTO.
[23] Nicholas J. Patterson,et al. The algebraic decoding of Goppa codes , 1975, IEEE Trans. Inf. Theory.