The authors propose new McEliece cryptosystems based on punctured Reedâ€“Muller (RM) codes. They successfully show that the commonly known attacks, such as the Minderâ€“Shokrollahi attack, theâ€¦ (More)

In this paper, for an odd prime p, two positive integers n, m with n = 2m, and pm â‰¡ 1 (mod 4), we derive an upper bound on the magnitude of the cross-correlation function between two decimatedâ€¦ (More)

SUMMARY Let p be an odd prime such that p â‰¡ 3 mod 4 and n be an odd positive integer. In this paper, two new families of p-ary sequences of period N = p n âˆ’1 2 are constructed by two decimated p-aryâ€¦ (More)

SUMMARY Based on the work by Helleseth [1], for an odd prime p and an even integer n = 2m, the cross-correlation values between two decimated m-sequences by the decimation factors 2 and 4p n/2 âˆ’ 2â€¦ (More)

Let p be an odd prime such that p â‰¡ 3 mod 4 and n be an odd integer. In this paper, two new families of p-ary sequences of period N = p âˆ’1 2 are constructed by two decimated p-ary m-sequences m(2t)â€¦ (More)

In this paper, we propose a new signature scheme based on a punctured Reedâ€“Muller (RM) code with random insertion, which improves the Goppa code-based signature scheme developed by Courtois, Finiasz,â€¦ (More)