1,469 research outputs found

    On the security of digital signature schemes based on error-correcting codes

    Get PDF
    We discuss the security of digital signature schemes based on error-correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to explain why the Xinmei scheme failed, such as the linearity of the signature and the redundancy of public keys. Another weakness is found in the Alabbadi-Wicker scheme, which results in a universal forgery attack against it. This attack shows that the Alabbadi-Wicker scheme fails to implement the necessary property of a digital signature scheme: it is infeasible to find a false signature algorithm D from the public verification algorithm E such that E(D*(m)) = m for all messages m. Further analysis shows that this new weakness also applies to the Xinmei scheme

    All binary, (n,e,r)-uniformly packed codes are known

    Get PDF

    Language, meaning, sense and reference: Matthew's passion narrative and Psalm 22

    Get PDF
    Language, meaning, sense and reference:Matthew's passion narrative and Psalm 22The passion narrative of Jesus as told by Matthew is a verbal enunciation which finds its place next to other passion narratives in which the narrator lets the protagonist use the words of the '1' person of Psalm 22 and in which the narrator describes internal and external conflicts with the words of the Psalm. Against the background of the Greek Septuagint and the Aramaic text in the Targum, parallel to what the hymnist of Qumran tries to do and the narrator of the story about Aseneth, based on the narrative as we find it in Mark, Matthew took Psalm 22 as anchor for his story. What is described in the Psalm, happens in the life and death of Jesus. To approach Jesus' passion more closely, Matthew used poeticlanguage: words on words on words. The passion and death of Jesus hasthus become literature, an ambiguous attempt to express the impossible. The question, 'how can one maintain today compassion against the forcesof violence?', is the concern of the article

    Uniformly packed codes

    Get PDF

    All binary, (n,e,r)-uniformly packed codes are known

    Get PDF

    Binary uniformly packed codes

    Get PDF

    A proof of the nonexistence of a binary (55,7,26) code

    Get PDF
    • …
    corecore