Back to Results
First PageMeta Content
Mathematics / Public-key cryptography / Error detection and correction / Algebra / Post-quantum cryptography / McEliece cryptosystem / Goppa code / Niederreiter cryptosystem / Reed–Solomon error correction / Coding theory / Abstract algebra / Finite fields


Wild McEliece Incognito Daniel J. Bernstein1 , Tanja Lange2 , and Christiane Peters3 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA
Add to Reading List

Document Date: 2011-09-15 08:54:20


Open Document

File Size: 333,85 KB

Share Result on Facebook

Company

McEliece / Cisco / Patterson / /

/

Facility

Mathematics Technical University of Denmark / National Institute of Standards and Technology / University of Illinois at Chicago / Computer Science University of Illinois at Chicago / /

IndustryTerm

computer technology / attack algorithms / cryptanalytic software / parameter search / t-error decoding algorithm / polynomial-time list-decoding algorithms / /

Organization

National Institute of Standards and Technology / Danish Council for Independent Research / Technical University of Denmark / University of Illinois at Chicago / Department of Mathematics and Computer Science Technische Universiteit Eindhoven / European Commission / /

Person

Peter Beelen / /

Position

author / D. J. / /

ProvinceOrState

Illinois / /

Technology

cryptography / secret key / t-error decoding algorithm / public key / computer technology / attack algorithms / polynomial-time list-decoding algorithms / /

URL

http /

SocialTag