Date: 2011-09-15 08:54:20Mathematics Public-key cryptography Error detection and correction Algebra Post-quantum cryptography McEliece cryptosystem Goppa code Niederreiter cryptosystem Reed–Solomon error correction Coding theory Abstract algebra Finite fields | | Wild McEliece Incognito Daniel J. Bernstein1 , Tanja Lange2 , and Christiane Peters3 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USAAdd to Reading ListSource URL: eprint.iacr.orgDownload Document from Source Website File Size: 333,85 KBShare Document on Facebook
|