Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
We present a code-based public-key cryptosystem, in which we use Reed-Solomon codes over an extension field as secret codes and disguise it by considering its shortened expanded code over the base field. Considering shortened expanded codes provides a safeguard against distinguisher attacks based on the Schur product.
Jun 3, 2019 · We present a code-based public-key cryptosystem, in which we use Reed-Solomon codes over an extension field as secret codes and disguise it by ...
We present a code-based public-key cryptosystem, in which we use Reed-Solomon codes over an extension field as secret codes and disguise it by considering ...
We present a code-based public-key cryptosystem, in which we use Reed-Solomon codes over an extension field as secret codes and disguise it by considering its ...
Abstract. We present a code-based public-key cryptosystem, in which we use Reed-Solomon codes over an extension field as secret codes and disguise it.
We present a code-based public-key cryptosystem, in which we use Reed-Solomon codes over an extension field as secret codes and disguise it by considering its ...
A code-based public-key cryptosystem, in which Reed-Solomon codes over an extension field as secret codes and disguise it by considering its expanded code ...
Oct 22, 2024 · We present a code-based public-key cryptosystem, in which we use Reed-Solomon codes over an extension field as secret codes and disguise it ...
People also ask
Karan Khathuria, Joachim Rosenthal, Violetta Weger : Encryption Scheme Based on Expanded Reed-Solomon Codes. CoRR abs/1906.00745 (2019).
Download PDF 'Encryption scheme based on expanded Reed-Solomon codes'. Preview. Content: Published Version; Language: English; Licence: Creative Commons: ...