À propos de cet article
Publié en ligne: 25 févr. 2017
Pages: 85 - 92
Reçu: 01 déc. 2016
DOI: https://doi.org/10.1515/tmmp-2016-0032
Mots clés
© 2016 Tomáš Fabšič et al., published by De Gruyter Open
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.
It is known that a naive implementation of the decryption algorithm in the McEliece cryptosystem allows an attacker to recover the secret matrix