Voir la notice de l'article provenant de la source Math-Net.Ru
@article{DM_2009_21_3_a10, author = {I. V. Chizhov}, title = {The key space of the {McEliece--Sidelnikov} cryptosystem}, journal = {Diskretnaya Matematika}, pages = {132--159}, publisher = {mathdoc}, volume = {21}, number = {3}, year = {2009}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/DM_2009_21_3_a10/} }
I. V. Chizhov. The key space of the McEliece--Sidelnikov cryptosystem. Diskretnaya Matematika, Tome 21 (2009) no. 3, pp. 132-159. http://geodesic.mathdoc.fr/item/DM_2009_21_3_a10/
[1] McEliece R. J., A public-key cryptosystem based on algebraic coding theory, DSN Progress Report 42–44, Jet Prop. Lab., Calif. Inst. Technol., Pasadena, CA, 1978, 114–116
[2] Sidelnikov V. M., “Otkrytoe shifrovanie na osnove dvoichnykh kodov Rida–Mallera”, Diskretnaya matematika, 6:2 (1994), 3–20 | MR | Zbl
[3] Sidelnikov V. M., Shestakov S. O., “O bezopasnosti sistemy shifrovaniya, postroennoi na osnove obobschennykh kodov Rida–Solomona”, Diskretnaya matematika, 4:3 (1992), 57–63 | MR | Zbl
[4] Evseev G. S., “O slozhnosti dekodirovaniya lineinykh kodov”, Problemy peredachi informatsii, 19:1 (1983), 3–8 | MR | Zbl
[5] Kruk E. A., “Granitsa dlya slozhnosti dekodirovaniya lineinykh kodov”, Problemy peredachi informatsii, 25:3 (1989), 103–107 | MR | Zbl
[6] Mak-Vilyams F. Dzh., Sloen N. Dzh., Teoriya kodov, ispravlyayuschikh oshibki, Svyaz, Moskva, 1979
[7] Pless V. S., Huffman W. C. (eds.), Handbook of coding theory, Vol. I–II, Elsevier, Amsterdam, 1998 | MR
[8] Sidelnikov V. M., Pershakov A. S., “Dekodirovanie kodov Rida–Mallera pri bolshom chisle oshibok”, Problemy peredachi informatsii, 28:3 (1992), 80–94 | MR | Zbl
[9] Karpunin G. A., “O klyuchevom prostranstve kriptosistemy Mak-Elisa na osnove dvoichnykh kodov Rida–Mallera”, Diskretnaya matematika, 16:2 (2004), 79–84 | MR | Zbl
[10] Kasami T., Tokura N., Ivadari E., Inagaki Ya., Teoriya kodirovaniya, Mir, Moskva, 1978 | MR
[11] Kasami T., Tokura N., “On the weight structure of Reed–Muller codes”, IEEE Trans. Inform. Theory, 16 (1970), 752–759 | DOI | MR | Zbl