Author of the publication

A Distinguisher-Based Attack on a Variant of McEliece's Cryptosystem Based on Reed-Solomon Codes

, , and . CoRR, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes., , and . IACR Cryptology ePrint Archive, (2012)Developing Synergies between Faculty and Students of European Business Schools through Telecommunication and Computer Supported Cooperative Tools., , , and . Bled eConference, page 15. (2001)A Distinguisher for High Rate McEliece Cryptosystems., , , , and . IACR Cryptology ePrint Archive, (2010)Cross-Cultural Language Teaching with Multimedia Tools.. CALL, Culture and the Language Curriculum, Springer, (1998)A Distinguisher-Based Attack on a Variant of McEliece's Cryptosystem Based on Reed-Solomon Codes, , and . CoRR, (2012)A Polynomial-Time Attack on the BBCRS Scheme., , , and . IACR Cryptology ePrint Archive, (2016)Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon Codes., , , , and . CoRR, (2013)A distinguisher for high rate McEliece cryptosystems., , , , and . ITW, page 282-286. IEEE, (2011)A Distinguisher for High-Rate McEliece Cryptosystems., , , , and . IEEE Trans. Inf. Theory, 59 (10): 6830-6844 (2013)Dual Toric Codes and Polytopes of Degree One., and . SIAM J. Discret. Math., 29 (1): 683-692 (2015)