Voir la notice de l'article provenant de la source Math-Net.Ru
@article{DM_2014_26_1_a1, author = {M. A. Borodin and I. V. Chizhov}, title = {Effective attack on the {McEliece} cryptosystem based on {Reed--Muller} codes}, journal = {Diskretnaya Matematika}, pages = {10--20}, publisher = {mathdoc}, volume = {26}, number = {1}, year = {2014}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/DM_2014_26_1_a1/} }
M. A. Borodin; I. V. Chizhov. Effective attack on the McEliece cryptosystem based on Reed--Muller codes. Diskretnaya Matematika, Tome 26 (2014) no. 1, pp. 10-20. http://geodesic.mathdoc.fr/item/DM_2014_26_1_a1/
[1] McEliece R. J., A public-key cryptosystem based on algebraic coding theory, DSN Prog. Rep., Jet Prop. Lab., California Inst. Technol., 1978, January, 114–116
[2] H. Neiderreiter, “Knapsack-type cryptosystems and algebraic coding theory”, Probl. of Control and Inf. Theory, 15 (1986), 159–166 | MR
[3] Sidelnikov V. M., “Otkrytoe shifrovanie na osnove dvoichnykh kodov Rida–Mallera”, Diskretnaya matematika, 6:2 (1994), 3–20 | MR | Zbl
[4] Mak-Vilyams F. Dzh., Sloen N. Dzh., Teoriya kodov, ispravlyayuschikh oshibki, Svyaz, Moskva, 1979
[5] Minder L., Shokrollahi A., “Cryptanalysis of the Sidelnikov cryptosystem”, Advances in Cryptology – EUROCRYPT 2007, Lect. Notes Comput. Sci., 4515, 2007, 347–360 | DOI | MR | Zbl