Vulnerabilities of the McEliece Variants Based on Polar Codes.
Vlad DragoiValeriu BeiuDominic BucerzanPublished in: SecITC (2018)
Keyphrases
- frequency domain
- error correction
- rotation invariant
- error correcting codes
- fourier transform
- information security
- fourier analysis
- security patterns
- information systems
- security risks
- real time
- polar coordinates
- formal model
- security issues
- denoising
- evolutionary algorithm
- computational complexity
- learning algorithm