X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
computer science (6) 6
goppa codes (6) 6
wild goppa codes (4) 4
[ info.info-it ] computer science [cs]/information theory [cs.it] (3) 3
[ math.math-it ] mathematics [math]/information theory [math.it] (3) 3
information theory (3) 3
mceliece cryptosystem (3) 3
wild mceliece cryptosystem (3) 3
[ info.info-cr ] computer science [cs]/cryptography and security [cs.cr] (2) 2
[info.info-it]computer science [cs]/information theory [cs.it] (2) 2
[math.math-it]mathematics [math]/information theory [math.it] (2) 2
algorithm analysis and problem complexity (2) 2
computer communication networks (2) 2
computer science - information theory (2) 2
cryptanalysis (2) 2
cryptography and security (2) 2
data encryption (2) 2
discrete mathematics in computer science (2) 2
filtration (2) 2
list decoding (2) 2
mathematics (2) 2
mathematics - number theory (2) 2
mathematics, applied (2) 2
niederreiter cryptosystem (2) 2
polynomials (2) 2
public-key cryptography (2) 2
94b05 (1) 1
94b65 (1) 1
[ math.math-nt ] mathematics [math]/number theory [math.nt] (1) 1
[info.info-cr]computer science [cs]/cryptography and security [cs.cr] (1) 1
[math.math-nt]mathematics [math]/number theory [math.nt] (1) 1
attacks (1) 1
bch codes (1) 1
beweis (1) 1
chaos theory (1) 1
codes (1) 1
coding and information theory (1) 1
complexity theory (1) 1
computer science - cryptography and security (1) 1
computer science, information systems (1) 1
computer science, theory & methods (1) 1
cryptography (1) 1
cryptology (1) 1
cryptosystems (1) 1
data structures and information theory (1) 1
decodierung (1) 1
decoding (1) 1
decomposition (1) 1
definition (1) 1
encryption (1) 1
engineering, electrical & electronic (1) 1
entschlüsselung (1) 1
fields (1) 1
gabidulin - paramonov - tretjakov public key cryptosystem (1) 1
gabidulin-paramonov-tretjakov public key cryptosystem (1) 1
goppa code distinguishing problem (1) 1
hexi codes (1) 1
hexi maximum rank distance codes (1) 1
hexi mceliece public key cryptosystem (1) 1
hexi polynomial codes (1) 1
hexi wild goppa codes (1) 1
heximaximum rank distance codes (1) 1
index terms—mceliece cryptosystem (1) 1
information and communication, circuits (1) 1
information systems applications (1) 1
komplexität (1) 1
kryptoanalyse (1) 1
linear codes (1) 1
management of computing and information systems (1) 1
maximum rank distance codes (1) 1
maximum rank distance codes, hexi codes (1) 1
mceliece public key cryptosystem (1) 1
norms (1) 1
norms and traces (1) 1
number theory (1) 1
operating systems (1) 1
parameters (1) 1
physics, mathematical (1) 1
polynom (1) 1
public key cryptography (1) 1
public-key (1) 1
research (1) 1
scheme (1) 1
subcodes (1) 1
systems and data security (1) 1
totally decomposed goppa codes (1) 1
trace operator (1) 1
traces (1) 1
true dimension (1) 1
usage (1) 1
wild goppa code (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Designs, Codes and Cryptography, ISSN 0925-1022, 3/2019, Volume 87, Issue 2, pp. 569 - 587
A class of q-ary totally decomposed cumulative $$\varGamma (L,G^{j})$$ Γ ( L , G j ) -codes with $$L=\{ \alpha \in :G(\alpha )\ne 0 \}$$ L = { α ∈ : G ( α ) ≠ 0... 
Information and Communication, Circuits | Totally decomposed Goppa codes | Wild Goppa codes | Discrete Mathematics in Computer Science | Computer Science | Goppa codes | 94B05 | Coding and Information Theory | Cryptology | 94B65 | Data Structures and Information Theory | MATHEMATICS, APPLIED | COMPUTER SCIENCE, THEORY & METHODS
Journal Article
Finite Fields and Their Applications, ISSN 1071-5797, 09/2014, Volume 29, pp. 178 - 197
For a given support L∈Fqmn and a polynomial g∈Fqm[x] with no roots in Fqm, we prove equality between the q-ary Goppa codes Γq(L,N(g))=Γq(L,N(g)/g) where N(g... 
Norms | BCH codes | Traces | Goppa codes | MATHEMATICS | MATHEMATICS, APPLIED | TRACE OPERATOR | TRUE DIMENSION | PARAMETERS | SUBCODES | Mathematics | Information Theory | Number Theory | Computer Science
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 01/2017, Volume 63, Issue 1, pp. 404 - 427
Journal Article
Selected Areas in Cryptography (17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers), ISSN 0302-9743, 2011, Volume 6544, pp. 143 - 158
Conference Proceeding
Post-Quantum Cryptography (4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29-December 2, 2011. Proceedings), ISSN 0302-9743, 2011, Volume 7071, pp. 244 - 254
The wild McEliece cryptosystem uses wild Goppa codes over finite fields to achieve smaller public key sizes compared to the original McEliece cryptosystem at the same level of security against all attacks known... 
Systems and Data Security | Discrete Mathematics in Computer Science | Data Encryption | Computer Science | Management of Computing and Information Systems | Computer Communication Networks | Algorithm Analysis and Problem Complexity | wild Goppa codes | McEliece cryptosystem | Niederreiter cryptosystem | Goppa codes | list decoding
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8441, pp. 17 - 39
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.