Publisher
Springer Berlin Heidelberg
Reference109 articles.
1. Adams, C., Meijer, H.: Security-related comments regarding McEliece’s public-key cryptosystem. IEEE Trans. Inform. Theory 35, 454–455 (1989)
2. Lecture Notes in Computer Science;C. Aguilar Melchor,2008
3. Ashikmin, A.E., Barg, A.: Minimal vectors in linear codes. IEEE Transaction on Information Theory 44(5) (1998)
4. Augot, D., Barbier, M., Couvreur, A.: List-decoding of binary goppa codes up to the binary johnson bound. In: IEEE, ITW 2011, pp. 229–233 (October 2011)
5. Augot, D., Finiasz, M., Gaborit, P., Manuel, S., Sendrier, N.: Sha-3 proposal: Fsb. Submission to NIST (2008)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献