Please use this identifier to cite or link to this item: https://doi.org/10.1109/18.272496
DC FieldValue
dc.titleOn the equivalence of McEliece's and Niederreiter's public-key cryptosystems
dc.contributor.authorLi, Yuan Xing
dc.contributor.authorDeng, Robert H.
dc.contributor.authorWang, Xin Mei
dc.date.accessioned2014-06-17T06:52:06Z
dc.date.available2014-06-17T06:52:06Z
dc.date.issued1994-01
dc.identifier.citationLi, Yuan Xing,Deng, Robert H.,Wang, Xin Mei (1994-01). On the equivalence of McEliece's and Niederreiter's public-key cryptosystems. IEEE Transactions on Information Theory 40 (1) : 271-273. ScholarBank@NUS Repository. <a href="https://doi.org/10.1109/18.272496" target="_blank">https://doi.org/10.1109/18.272496</a>
dc.identifier.issn00189448
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/62533
dc.description.abstractIt is shown that McEliece's and Niederreiter's public-key cryptosystems are equivalent when set up for corresponding choices of parameters. A security analysis for the two systems, based on this equivalence observation, is presented.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/18.272496
dc.sourceScopus
dc.typeArticle
dc.contributor.departmentELECTRICAL ENGINEERING
dc.description.doi10.1109/18.272496
dc.description.sourcetitleIEEE Transactions on Information Theory
dc.description.volume40
dc.description.issue1
dc.description.page271-273
dc.description.codenIETTA
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.