1![515 CORRESPONDENCE On the Complexity DILIP 515 CORRESPONDENCE On the Complexity DILIP](https://www.pdfsearch.io/img/a1c0bbf21274c784502d3f17701b73a3.jpg) | Add to Reading ListSource URL: www.ifp.illinois.eduLanguage: English - Date: 2003-07-08 17:06:33
|
---|
2![U NE ATTAQUE ´ MA POLYNOMIALE DU SCH E DE M C E LIECE BAS E´ SUR LES U NE ATTAQUE ´ MA POLYNOMIALE DU SCH E DE M C E LIECE BAS E´ SUR LES](https://www.pdfsearch.io/img/b271c03da6aad81e759e78f13e6257f2.jpg) | Add to Reading ListSource URL: caramba.loria.frLanguage: English - Date: 2016-06-13 15:37:33
|
---|
3![Lower Bounds on Distances of Improved Two-Point Codes Radoslav Kirov University of Illinois, Urbana-Champaign July 21, 2009 Lower Bounds on Distances of Improved Two-Point Codes Radoslav Kirov University of Illinois, Urbana-Champaign July 21, 2009](https://www.pdfsearch.io/img/55d6cc986c0b36592f5d3a5a39e01518.jpg) | Add to Reading ListSource URL: radokirov.comLanguage: English - Date: 2009-07-21 08:56:18
|
---|
4![A Polynomial-Time Attack on the BBCRS Scheme 1 Alain Couvreur Ayoub Otmani 2 Jean-Pierre Tillich A Polynomial-Time Attack on the BBCRS Scheme 1 Alain Couvreur Ayoub Otmani 2 Jean-Pierre Tillich](https://www.pdfsearch.io/img/7828902f0cde854303a1d1e524a9c5f5.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2015-03-30 09:27:24
|
---|
5![1 Secure Random Linear Code Based Public Key Encryption Scheme RLCE Yongge Wang KINDI Center for Computing Research 1 Secure Random Linear Code Based Public Key Encryption Scheme RLCE Yongge Wang KINDI Center for Computing Research](https://www.pdfsearch.io/img/30933e8456f90eddc7f99afe631d193e.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-03-31 03:22:40
|
---|
6![Wild McEliece Incognito Daniel J. Bernstein1 , Tanja Lange2 , and Christiane Peters3 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA Wild McEliece Incognito Daniel J. Bernstein1 , Tanja Lange2 , and Christiane Peters3 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA](https://www.pdfsearch.io/img/422798476d81ca6bb398d1286f966c9f.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2011-09-15 08:54:20
|
---|
7![Polynomial Time Attack on Wild McEliece Over Quadratic Extensions Alain Couvreur1 , Ayoub Otmani2 , and Jean–Pierre Tillich3 Polynomial Time Attack on Wild McEliece Over Quadratic Extensions Alain Couvreur1 , Ayoub Otmani2 , and Jean–Pierre Tillich3](https://www.pdfsearch.io/img/28af7da308ed774485013b908751d991.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2014-02-13 14:34:46
|
---|
8![Code-based Cryptography:Implementing the McEliece Scheme on Reconfigurable Hardware Code-based Cryptography:Implementing the McEliece Scheme on Reconfigurable Hardware](https://www.pdfsearch.io/img/a94c5b72c68e40f8daac46578c28f2da.jpg) | Add to Reading ListSource URL: www.emsec.rub.deLanguage: English - Date: 2010-04-20 22:07:38
|
---|
9![Vol. 9, Vol. 9,](https://www.pdfsearch.io/img/7474085626454add47d73cfde906b642.jpg) | Add to Reading ListSource URL: www.jssac.orgLanguage: English - Date: 2005-07-09 14:10:01
|
---|
10![](https://www.pdfsearch.io/img/829cf2740045facd234169eed9239fcd.jpg) | Add to Reading ListSource URL: infosec.seu.edu.cnLanguage: English - Date: 2010-09-29 22:29:40
|
---|