Please use this identifier to cite or link to this item:
https://doi.org/10.1109/18.272496
DC Field | Value | |
---|---|---|
dc.title | On the equivalence of McEliece's and Niederreiter's public-key cryptosystems | |
dc.contributor.author | Li, Yuan Xing | |
dc.contributor.author | Deng, Robert H. | |
dc.contributor.author | Wang, Xin Mei | |
dc.date.accessioned | 2014-06-17T06:52:06Z | |
dc.date.available | 2014-06-17T06:52:06Z | |
dc.date.issued | 1994-01 | |
dc.identifier.citation | Li, Yuan Xing,Deng, Robert H.,Wang, Xin Mei (1994-01). On the equivalence of McEliece's and Niederreiter's public-key cryptosystems. IEEE Transactions on Information Theory 40 (1) : 271-273. ScholarBank@NUS Repository. <a href="https://doi.org/10.1109/18.272496" target="_blank">https://doi.org/10.1109/18.272496</a> | |
dc.identifier.issn | 00189448 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/62533 | |
dc.description.abstract | It is shown that McEliece's and Niederreiter's public-key cryptosystems are equivalent when set up for corresponding choices of parameters. A security analysis for the two systems, based on this equivalence observation, is presented. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/18.272496 | |
dc.source | Scopus | |
dc.type | Article | |
dc.contributor.department | ELECTRICAL ENGINEERING | |
dc.description.doi | 10.1109/18.272496 | |
dc.description.sourcetitle | IEEE Transactions on Information Theory | |
dc.description.volume | 40 | |
dc.description.issue | 1 | |
dc.description.page | 271-273 | |
dc.description.coden | IETTA | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.