Filters








1 Hit in 7.3 sec

Vulnerabilities of "McEliece in the World of Escher" [chapter]

Dustin Moody, Ray Perlner
2016 Lecture Notes in Computer Science  
The general approach was referred to as McEliece in the World of Escher.  ...  This paper demonstrates attacks which are significantly cheaper than the claimed security level of the parameters given by Gligoroski et al.  ...  We will refer to their scheme as McEliece Escher, since it was introduced in their paper McEliece in the World of Escher [5, 6] .  ... 
doi:10.1007/978-3-319-29360-8_8 fatcat:vanewhdnwrburgq4m4a4qivbee