Joint encryption and error correction schemes
ISCA '84 Proceedings of the 11th annual international symposium on Computer architecture
An observation on the security of McEliece's public-key cryptosystem
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Secret error-correcting codes (SECC)
CRYPTO '88 Proceedings on Advances in cryptology
On Struik-Tilburg Cryptanalysis of Rao-Nam Scheme
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext Attack
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Computer Networks: The International Journal of Computer and Telecommunications Networking
ECC-based lightweight authentication protocol with untraceability for low-cost RFID
Journal of Parallel and Distributed Computing
Hi-index | 0.00 |
Public-key cryptosystems using very large distance algebraic codes have been studied previously. Private-key cryptosystems using simpler codes have also been subject of some study recently. This paper proposes a new approach to the private-key cryptosystems which allows use of very simple codes such as distance 3 and 4 Hamming codes.This new approach gives not only very efficient encoding/decoding and very high information rates but also appears to be secure even under chosenplaintext attacks.