On the equivalence of McEliece's and Niederreiter's public-key cryptosystems

It is shown that McEliece's and Niederreiter's public-key cryptosystems are equivalent when set up for corresponding choices of parameters. A security analysis for the two systems based on this equivalence observation, is presented

Saved in:
書目詳細資料
Main Authors: LI, Y. X., DENG, Robert H., WANG, X. M.
格式: text
語言:English
出版: Institutional Knowledge at Singapore Management University 1994
主題:
在線閱讀:https://ink.library.smu.edu.sg/sis_research/94
https://ink.library.smu.edu.sg/context/sis_research/article/1093/viewcontent/On_the_equivalence_of_McEliece_s_and_Niederreiter_s_public_key_cryptosystems.pdf
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
id sg-smu-ink.sis_research-1093
record_format dspace
spelling sg-smu-ink.sis_research-10932019-04-02T03:24:26Z On the equivalence of McEliece's and Niederreiter's public-key cryptosystems LI, Y. X. DENG, Robert H. WANG, X. M. It is shown that McEliece's and Niederreiter's public-key cryptosystems are equivalent when set up for corresponding choices of parameters. A security analysis for the two systems based on this equivalence observation, is presented 1994-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/94 info:doi/10.1109/18.272496 https://ink.library.smu.edu.sg/context/sis_research/article/1093/viewcontent/On_the_equivalence_of_McEliece_s_and_Niederreiter_s_public_key_cryptosystems.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Information Security
spellingShingle Information Security
LI, Y. X.
DENG, Robert H.
WANG, X. M.
On the equivalence of McEliece's and Niederreiter's public-key cryptosystems
description It is shown that McEliece's and Niederreiter's public-key cryptosystems are equivalent when set up for corresponding choices of parameters. A security analysis for the two systems based on this equivalence observation, is presented
format text
author LI, Y. X.
DENG, Robert H.
WANG, X. M.
author_facet LI, Y. X.
DENG, Robert H.
WANG, X. M.
author_sort LI, Y. X.
title On the equivalence of McEliece's and Niederreiter's public-key cryptosystems
title_short On the equivalence of McEliece's and Niederreiter's public-key cryptosystems
title_full On the equivalence of McEliece's and Niederreiter's public-key cryptosystems
title_fullStr On the equivalence of McEliece's and Niederreiter's public-key cryptosystems
title_full_unstemmed On the equivalence of McEliece's and Niederreiter's public-key cryptosystems
title_sort on the equivalence of mceliece's and niederreiter's public-key cryptosystems
publisher Institutional Knowledge at Singapore Management University
publishDate 1994
url https://ink.library.smu.edu.sg/sis_research/94
https://ink.library.smu.edu.sg/context/sis_research/article/1093/viewcontent/On_the_equivalence_of_McEliece_s_and_Niederreiter_s_public_key_cryptosystems.pdf
_version_ 1770568887503421440