- 1 Reed, J.S., and G. Solomon, 1960, "Polynomial Codes over Certain Finite Fields" Jour. Soc. Industrial and Applied Mathematics, 8, 300-304.Google ScholarCross Ref
- 2 Peterson, W.W. and E.J. Weldon, Jr., 1972, "Error Correcting Codes," MIT Press, Cambridge, Mass.Google Scholar
- 3 Varanasi, M.R., T.R.N. Rao and S. Pham, 1984, "Memory Package Error Detection and Correction," IEEE Trans. Comp. Vol. C-33.Google Scholar
- 4 Carter, W.C., A.B. Wadia, 1981, "Design and Analysis of Codes and Their Self-checking Circuit Implementations for Correction and Detection of Multiple b-adjacent Errors." Proc. 10th IEEE Symp. on Fault-Tolerant Comp.Google Scholar
- 5 Kaneda, S. and E. Fujiware, 1982, "Single Byte Error Correcting-Double Byte Error Detecting Codes for Memory Systems," IEEE Tran. Comput., C-31, pp. 596-601.Google ScholarDigital Library
- 6 NBS, 77, 1977, "Data Encryption Standard" FIPS Pub 46, National Bureau of Standards, Washington, D.C.Google Scholar
- 7 Denning, D.E.R., 1983, "Cryptography and Data Security," Addison Wesley Pub. Google ScholarDigital Library
- 8 Kak, S.C., 1983, "Joint Encryption and Error Correction Coding," Proc. IEEE Symp. on Security and Privacy, Oakland, Ca., April 1983. Google ScholarDigital Library
- 9 McEliece, R.J., 1978, "A Public-key Cryptosystem Based on Algebraic Coding Theory," DSN Progress Report, Jet Propulson Laboratory, Ca.Google Scholar
Index Terms
- Joint encryption and error correction schemes
Recommendations
On the (in)security of two Joint Encryption and Error Correction schemes
Joint Encryption and Error Correction (JEEC) is proposed to combine encoding/encryption as one process to boost more compact implementations. In this paper, we provide rigorous investigation on the security of two JECC schemes, namely ECBC and SECC. For ...
Versatile padding schemes for joint signature and encryption
CCS '04: Proceedings of the 11th ACM conference on Computer and communications securityWe propose several highly-practical and optimized constructions for joint signature and encryption primitives often referred to as <i>signcryption</i>. All our signcryption schemes, built directly from trapdoor permutations such as RSA, share features ...
Joint scheme for physical layer error correction and security
We present a joint scheme that combines both error correction and security at the physical layer. In conventional communication systems, error correction is carried out at the physical layer while data security is performed at an upper layer. As a ...
Comments