Premium
A symmetric version of the McEliece public‐key cryptosystem
Author(s) -
Al Jabri A. Kh.
Publication year - 1997
Publication title -
international journal of network management
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.373
H-Index - 28
eISSN - 1099-1190
pISSN - 1055-7148
DOI - 10.1002/(sici)1099-1190(199711/12)7:6<316::aid-nem261>3.0.co;2-7
Subject(s) - mceliece cryptosystem , computer science , cryptosystem , key (lock) , code (set theory) , exploit , theoretical computer science , reduction (mathematics) , public key cryptosystem , key size , algorithm , public key cryptography , computer security , arithmetic , computer engineering , cryptography , encryption , programming language , mathematics , set (abstract data type) , geometry
This article exploits the fact that linear codes can correct twice the number of erasures as that of errors, allowing reduction in code size and providing the same level of security. © 1997 John Wiley & Sons, Ltd.