“…So FAPKC3 can resist linear R a , R b attack. It follows that FAPKC3 can resist the attack of the reduced echelon matrix from results in Tao [18] and Wang [19] and the attack of a canonical diagonal form of a -matrix from results in Tao and Feng [20]. Notice that we may generate automata in the user's key of FAPKC2 by the same method for FAPKC3, so that for such user's keys FAPKC2 is secure as well.…”