Goppa code

Results: 12



#Item
1515  CORRESPONDENCE On the Complexity DILIP

515 CORRESPONDENCE On the Complexity DILIP

Add to Reading List

Source URL: www.ifp.illinois.edu

Language: English - Date: 2003-07-08 17:06:33
2U NE ATTAQUE ´ MA POLYNOMIALE DU SCH E DE  M C E LIECE BAS E´ SUR LES

U NE ATTAQUE ´ MA POLYNOMIALE DU SCH E DE M C E LIECE BAS E´ SUR LES

Add to Reading List

Source URL: caramba.loria.fr

Language: English - Date: 2016-06-13 15:37:33
3Lower Bounds on Distances of Improved Two-Point Codes Radoslav Kirov University of Illinois, Urbana-Champaign  July 21, 2009

Lower Bounds on Distances of Improved Two-Point Codes Radoslav Kirov University of Illinois, Urbana-Champaign July 21, 2009

Add to Reading List

Source URL: radokirov.com

Language: English - Date: 2009-07-21 08:56:18
4A Polynomial-Time Attack on the BBCRS Scheme 1 Alain Couvreur  Ayoub Otmani 2 Jean-Pierre Tillich

A Polynomial-Time Attack on the BBCRS Scheme 1 Alain Couvreur Ayoub Otmani 2 Jean-Pierre Tillich

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-30 09:27:24
51  Secure Random Linear Code Based Public Key Encryption Scheme RLCE Yongge Wang KINDI Center for Computing Research

1 Secure Random Linear Code Based Public Key Encryption Scheme RLCE Yongge Wang KINDI Center for Computing Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-31 03:22:40
6Wild McEliece Incognito Daniel J. Bernstein1 , Tanja Lange2 , and Christiane Peters3 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

Wild McEliece Incognito Daniel J. Bernstein1 , Tanja Lange2 , and Christiane Peters3 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-09-15 08:54:20
7Polynomial Time Attack on Wild McEliece Over Quadratic Extensions Alain Couvreur1 , Ayoub Otmani2 , and Jean–Pierre Tillich3

Polynomial Time Attack on Wild McEliece Over Quadratic Extensions Alain Couvreur1 , Ayoub Otmani2 , and Jean–Pierre Tillich3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-02-13 14:34:46
8Code-based Cryptography:Implementing the McEliece Scheme on Reconfigurable Hardware

Code-based Cryptography:Implementing the McEliece Scheme on Reconfigurable Hardware

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2010-04-20 22:07:38
9Vol.  9,

Vol. 9,

Add to Reading List

Source URL: www.jssac.org

Language: English - Date: 2005-07-09 14:10:01
10

PDF Document

Add to Reading List

Source URL: infosec.seu.edu.cn

Language: English - Date: 2010-09-29 22:29:40