On the Security of Digital Signature Schemes Based on Error-Correcting Codes
暂无分享,去创建一个
[1] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] T. R. N. Rao,et al. Private-key algebraic-code encryptions , 1989, IEEE Trans. Inf. Theory.
[4] M. Alabbadi,et al. Susceptibility of digital signature schemes based on error-correcting codes to universal forgery , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[5] Thomas A. Berson,et al. Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack , 1997, CRYPTO.
[6] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[7] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[8] Florent Chabaud,et al. On the Security of Some Cryptosystems Based on Error-correcting Codes , 1994, EUROCRYPT.
[9] Elwyn R. Berlekamp,et al. On the inherent intractability of certain coding problems (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[10] Wang Xin-mei,et al. Digital signature scheme based on error-correcting codes , 1990 .
[11] Stephen B. Wicker,et al. A Digital Signature Scheme Based on Linear Error-correcting Block Codes , 1994, ASIACRYPT.
[12] Anne Canteaut,et al. Cryptanalysis of the Original McEliece Cryptosystem , 1998, ASIACRYPT.
[13] Gregory A. Kabatiansky,et al. A Digital Signature Scheme Based on Random Error-Correcting Codes , 1997, IMACC.
[14] Henk C. A. van Tilborg,et al. Sloppy Alice Attacks! Adaptive chosen ciphertext attacks on the McEliece public-key cryptosystem , 2002 .
[15] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[16] Jacques Stern,et al. A New Identification Scheme Based on Syndrome Decoding , 1993, CRYPTO.
[17] Stephen B. Wicker,et al. Cryptanalysis of the Harn and Wang modification of the Xinmei digital signature scheme , 1992 .
[18] Eric R. Verheul,et al. Sloppy Alice attacks! Adaptive chosen ciphertext attacks on the McEliece cryptosystem , 2002 .
[19] J. van Tilburg,et al. Security-analysis of a class of cryptosystems based on linear error-correcting codes , 1994 .
[20] J. van Tilburg. Cryptanalysis of Xinmei digital signature scheme , 1992 .
[21] Stephen B. Wicker,et al. Security of Xinmei digital signature scheme , 1992 .
[22] Lein Harn,et al. Cryptanalysis and modification of digital signature scheme based on error-correcting code , 1992 .
[23] Henk C. A. van Tilborg,et al. An Introduction to Cryptology , 1988 .