skip to main content
article
Free Access

Joint encryption and error correction schemes

Published:01 January 1984Publication History

Abstract

No abstract available.

References

  1. 1 Reed, J.S., and G. Solomon, 1960, "Polynomial Codes over Certain Finite Fields" Jour. Soc. Industrial and Applied Mathematics, 8, 300-304.Google ScholarGoogle ScholarCross RefCross Ref
  2. 2 Peterson, W.W. and E.J. Weldon, Jr., 1972, "Error Correcting Codes," MIT Press, Cambridge, Mass.Google ScholarGoogle Scholar
  3. 3 Varanasi, M.R., T.R.N. Rao and S. Pham, 1984, "Memory Package Error Detection and Correction," IEEE Trans. Comp. Vol. C-33.Google ScholarGoogle Scholar
  4. 4 Carter, W.C., A.B. Wadia, 1981, "Design and Analysis of Codes and Their Self-checking Circuit Implementations for Correction and Detection of Multiple b-adjacent Errors." Proc. 10th IEEE Symp. on Fault-Tolerant Comp.Google ScholarGoogle Scholar
  5. 5 Kaneda, S. and E. Fujiware, 1982, "Single Byte Error Correcting-Double Byte Error Detecting Codes for Memory Systems," IEEE Tran. Comput., C-31, pp. 596-601.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6 NBS, 77, 1977, "Data Encryption Standard" FIPS Pub 46, National Bureau of Standards, Washington, D.C.Google ScholarGoogle Scholar
  7. 7 Denning, D.E.R., 1983, "Cryptography and Data Security," Addison Wesley Pub. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 Kak, S.C., 1983, "Joint Encryption and Error Correction Coding," Proc. IEEE Symp. on Security and Privacy, Oakland, Ca., April 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9 McEliece, R.J., 1978, "A Public-key Cryptosystem Based on Algebraic Coding Theory," DSN Progress Report, Jet Propulson Laboratory, Ca.Google ScholarGoogle Scholar

Index Terms

  1. Joint encryption and error correction schemes

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM SIGARCH Computer Architecture News
            ACM SIGARCH Computer Architecture News  Volume 12, Issue 3
            June 1984
            348 pages
            ISSN:0163-5964
            DOI:10.1145/773453
            Issue’s Table of Contents
            • cover image ACM Conferences
              ISCA '84: Proceedings of the 11th annual international symposium on Computer architecture
              January 1984
              373 pages
              ISBN:0818605383
              DOI:10.1145/800015

            Copyright © 1984 Author

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 January 1984

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader