About this article
Published Online: Feb 25, 2017
Page range: 85 - 92
Received: Dec 01, 2016
DOI: https://doi.org/10.1515/tmmp-2016-0032
Keywords
© 2016 Tomáš Fabšič et al., published by De Gruyter Open
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.
It is known that a naive implementation of the decryption algorithm in the McEliece cryptosystem allows an attacker to recover the secret matrix