Login / Signup
Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes.
Alain Couvreur
Philippe Gaborit
Valérie Gauthier-Umaña
Ayoub Otmani
Jean-Pierre Tillich
Published in:
Des. Codes Cryptogr. (2014)
Keyphrases
</>
reed solomon codes
public key cryptosystems
modular exponentiation
wireless sensor networks
elliptic curve
elliptic curve cryptography
watermarking scheme
encryption scheme
key distribution
security mechanisms
security protocols
image processing
intrusion detection
watermarking algorithm
secret key