Abstract
This paper describes the original linear code-based cryptosystem and shows how it evolves after successful structural-based attacks have been discover......
小提示:本篇文献需要登录阅读全文,点击跳转登录