Li Yuanxing. USING BCH OR OTHER LINEAR BLOCK CODES TO CON-STRUCT MCELIECE S PUBLIC KEY CRYPTOSYSTEM[J]. Journal of Electronics & Information Technology, 1993, 15(2): 208-211.
Citation:
Li Yuanxing. USING BCH OR OTHER LINEAR BLOCK CODES TO CON-STRUCT MCELIECE S PUBLIC KEY CRYPTOSYSTEM[J]. Journal of Electronics & Information Technology, 1993, 15(2): 208-211.
Li Yuanxing. USING BCH OR OTHER LINEAR BLOCK CODES TO CON-STRUCT MCELIECE S PUBLIC KEY CRYPTOSYSTEM[J]. Journal of Electronics & Information Technology, 1993, 15(2): 208-211.
Citation:
Li Yuanxing. USING BCH OR OTHER LINEAR BLOCK CODES TO CON-STRUCT MCELIECE S PUBLIC KEY CRYPTOSYSTEM[J]. Journal of Electronics & Information Technology, 1993, 15(2): 208-211.
McEliece's public-key cryptosystem was constructed with the Goppa codes. This paper shows other linear block codes, i.e., BCH codes or RS codes, can also be used to construct secure McEliece s cryptosystem.
R. J, McEliece, DSN Propress Report. Jet Propulsion Laboratory, Pasadema, Jan./Feb., (1978), PP,114-116.[2]T. R. N. Rao, K. H. Nam, IEEE Trans. on IT, IT-35(1989)4, 829-833.[3]F. J. Macwilliams, N. J. A. Sloane, The Theory of Error-Correcting Codes, Part I, North-Holland, Oxford, (1977), Ch. 12.[4]C. M. Adams, H. Meijer, IEEE Trans. on IT, IT-35(1989)2, 454-455.