Acerca de este artículo
Publicado en línea: 25 feb 2017
Páginas: 85 - 92
Recibido: 01 dic 2016
DOI: https://doi.org/10.1515/tmmp-2016-0032
Palabras clave
© 2016 Tomáš Fabšič et al., published by De Gruyter Open
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.
It is known that a naive implementation of the decryption algorithm in the McEliece cryptosystem allows an attacker to recover the secret matrix