- 1.McEliece, R.J., "A Public=Key Cryptosystem Based on Algebraic Coding Theory," DSN Progress Report 42-44, pp. 114-116, Jet Propulsion Laboratory, CA, January and February, 1978.Google Scholar
- 2.Rao, T.R.N. and Nam, K., "Private=Key Algebraic-Code Encryption," IEEE Transactions, Vol. IT-35, No. 4, pp. 829- 833, July, 1989.Google Scholar
- 3.Brickell, E.F, and Odlyzko, A., "Cryptanalysis: a survey of recent results," Proc. IEEE, 76, (5), pp. 153-165, 1988.Google ScholarCross Ref
- 4.Alencar, F.M.R., L~o, A.M.P., and Campello de Souza, R.M., "Private-Key Burst Correcting Code Encrypfion," Proc. 1EEE Int. Symp. Information Theory, January, pp. 227, 1993.Google ScholarCross Ref
- 5.Campello de Souza, R.M. and Campello do Souza, J., "Array Codes for Private-Key Encryption," Electronics Letters, Vol. 30, No. 17, pp. 1394-1396, August, 1994.Google ScholarCross Ref
- 6.Lin, S., Error Control Coding, Reading, prentice-HaU, 1983. Google ScholarDigital Library
Index Terms
- Cryptanalysis of private-key encryption schemes based on burst-error-correcting codes
Recommendations
Building Key-Private Public-Key Encryption Schemes
ACISP '09: Proceedings of the 14th Australasian Conference on Information Security and PrivacyIn the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts corresponding to the same message and identity, but generated using different TA ...
Public-Key encryption from ID-Based encryption without one-time signature
OTM'06: Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part IDesign a secure public key encryption scheme and its security proof are one of the main interests in cryptography In 2004, Canetti, Halevi and Katz [8] constructed a public key encryption (PKE) from a selective identity-based encryption scheme with a ...
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys
A convertible authenticated encryption scheme allows a specified recipient to recover and verify a message simultaneously. Moreover the recipient can prove the dishonesty of the sender to any third party if the sender repudiates her signature later. ...
Comments