no code implementations • 11 Aug 2011 • Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani
This paper studies a variant of the McEliece cryptosystem able to ensure that the code used as the public key is no longer permutation-equivalent to the secret code.
Information Theory Cryptography and Security Information Theory
no code implementations • 8 Jul 2011 • Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani
The last decades have seen a growing interest in hash functions that allow some sort of tolerance, e. g. for the purpose of biometric authentication.
Information Theory Cryptography and Security Information Theory