Subject
Computational Mathematics,Control and Optimization,Human-Computer Interaction
Reference10 articles.
1. J. R. McEliece, ‘‘A public-key cryptosystem based on algebraic coding theory,’’ DSN Progress Report 42–44 (Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA, 1978), pp. 114–116.
2. H. Niederreiter, ‘‘Knapsack type cryptosystems and algebraic coding theory,’’ Probl. Control Inf. Theory 15 (2), 159–166 (1986).
3. R. Pellikaan, ‘‘On decoding by error location and dependent sets of error positions,’’ Discrete Math. 106–107, 369–381 (1992). https://doi.org/10.1016/0012-365X(92)90567-Y
4. Cryptanalysis of the Niederreiter public key scheme based on GRS subcodes;C. Wieschebrink,2010
5. M. A. Borodin and I. V. Chizhov, ‘‘Effective attack on the McEliece cryptosystem based on Reed–Muller codes,’’ Discrete Math. Appl. 24 (5), 273–280 (2014). https://doi.org/10.1515/dma-2014-0024