Berlekamp E R, McEliece R J, van Tilborg H C A. On the inherent intractability of certain coding problems. IEEE Trans. on Information Theory, 1978, IT-24: 384- 386. [2]McEliece R J. A public-key cryptosystem based on algebraic coding theory. DSN Prog. Rep. 1978:42 - 44, 114 - 116. [3]Rao T R N. Joint encryption and error correction schemes. Confer ence Proceedings-11th Annual International Symposium on Com puter Architecture, Ann Arbor, Mich, USA., 1984:240 - 241. [4]王新梅,马文平,等.纠错密码理论.北京:人民邮电出版社,2001:137-139. [5]Rao T R N, Nam K H. Private-key algebraic-code encryptions.IEEE Trans. on Information Theory, 1989, 35(4): 829- 833. [6]Struik R, Tilburg J. The Rao-Nam scheme is insecure against a chosen-plaintext attack. Advances in Cryptology-CRYPTO ’87.New York: Springer-Verlag, 1988:458 - 461. [7]王新梅,肖国镇.纠错码-原理与方法.西安:西安电子科技大学出版社,2001:63-63. [8]Struik R. On the Rao-Nam scheme using nonlinear codes. Infor mation Theory Proceedings. 1991 IEEE International Symposium,Eindhoven University of Technology, 1991: 174 - 174. [9]Denny W F. Encryptions using linear and nonlinear codes:implementation and security considerations. [Ph.D. dissertation],The Center for Advanced Computer Studies, University of Southwestern Louisiana, Lafayette, 1988. [10]Sun H M, Hwang T. Key generation of algebraic-code crypto systems. Computer Math. Application, 1994, 27(2): 99- 106.
|