Proceedings. IEEE International Symposium on Information Theory
DOI: 10.1109/isit.1993.748513
|View full text |Cite
|
Sign up to set email alerts
|

Digital Signature Schemes Based on Error-correcting Codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(17 citation statements)
references
References 4 publications
0
17
0
Order By: Relevance
“…When the feedback size n is less than the block length, the average cycle length drops to around 2 m/2 . For a 64-bit block cipher, this is only 2 32 -not long enough.…”
Section: Security Problems With Ofbmentioning
confidence: 99%
See 4 more Smart Citations
“…When the feedback size n is less than the block length, the average cycle length drops to around 2 m/2 . For a 64-bit block cipher, this is only 2 32 -not long enough.…”
Section: Security Problems With Ofbmentioning
confidence: 99%
“…Function f is straightforward. First, the right half and the ith subkey are added modulo 2 32 . The result is broken into eight 4-bit chunks, and each chunk becomes the input to a different S-box.…”
Section: Description Of Gostmentioning
confidence: 99%
See 3 more Smart Citations