2005
DOI: 10.1002/0470867574
|View full text |Cite
|
Sign up to set email alerts
|

Error Correcting Coding and Security for Data Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
45
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 69 publications
(45 citation statements)
references
References 0 publications
0
45
0
Order By: Relevance
“…If we want to avoid that the knowledge of a message/signature pair allows to recover the secret key, this implies for instance that the rate R of C known should be significantly larger than 2ρ, that is twice the rate of the secret code C hidden . This would change the parameters of the scheme significantly and give much larger key sizes than has been proposed in [KKS97, KKS05,BMJ11].…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…If we want to avoid that the knowledge of a message/signature pair allows to recover the secret key, this implies for instance that the rate R of C known should be significantly larger than 2ρ, that is twice the rate of the secret code C hidden . This would change the parameters of the scheme significantly and give much larger key sizes than has been proposed in [KKS97, KKS05,BMJ11].…”
Section: Discussionmentioning
confidence: 99%
“…A possible approach to meet this goal could be to build such schemes whose security relies on the difficulty of decoding linear codes. Two code based schemes of this kind have been proposed, namely the Courtois-Finiasz-Sendrier signature scheme [CFS01] and the Kabatianskii, Krouk and Smeets (KKS) scheme [KKS97,KKS05].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations