On the McEliece public-key cryptosystem

28Citations
Citations of this article
44Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Based on an idea by Hin, the method of obtaining the original message after selecting k of n coordinates at random in the McEliece public-key cryptosystem is improved. The attack, which is more efficient than the attacks previously proposed, is characterized by a systematic method of checking and by a random bit swapping procedure. An optimization procedure similar to the one proposed by Lee and Brickell is used to improve the attack. The attack is highly suitable for parallel and pipelined implementation. The work factor and the values, which yield ‘maximum’ security for the system are given. It is shown that the public-key can be reduced to k×(n-k) bits.

Cite

CITATION STYLE

APA

Van Tilburg, J. (1990). On the McEliece public-key cryptosystem. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 403 LNCS, pp. 119–131). Springer Verlag. https://doi.org/10.1007/0-387-34799-2_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free