<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.ellipticcurve.info/Error_correcting_codes/history?feed=atom</id>
	<title>Error correcting codes - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.ellipticcurve.info/Error_correcting_codes/history?feed=atom"/>
	<link rel="alternate" type="text/html" href="https://www.ellipticcurve.info/Error_correcting_codes/history"/>
	<updated>2026-05-06T13:23:04Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.42.3</generator>
	<entry>
		<id>https://www.ellipticcurve.info/index.php?title=Error_correcting_codes&amp;diff=333&amp;oldid=prev</id>
		<title>Rational Point: more papers</title>
		<link rel="alternate" type="text/html" href="https://www.ellipticcurve.info/index.php?title=Error_correcting_codes&amp;diff=333&amp;oldid=prev"/>
		<updated>2025-01-22T14:11:14Z</updated>

		<summary type="html">&lt;p&gt;more papers&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;What do Error Correcting Codes have to do with Elliptic Curve Cryptography apart from sharing a snappy acronym?&lt;br /&gt;
&lt;br /&gt;
“ECC” appears to be [https://www.ecc.com taken].&lt;br /&gt;
&lt;br /&gt;
Up for sale, and “ECC memory” for one thing never quite caught on in the consumer product market. “Ecc! Ick! Bugs!” is the subconscious Freudian impression.&lt;br /&gt;
&lt;br /&gt;
Sales are really loud in the &amp;lt;tt&amp;gt;.com&amp;lt;/tt&amp;gt; domain. You have to hear the “double-you double-you double-you” on the radio and get out your pen and write down the web address.&lt;br /&gt;
&lt;br /&gt;
== Error correcting codes on elliptic curves ==&lt;br /&gt;
&lt;br /&gt;
Nevertheless, we think there’s a possibility of developing strong error correcting codes on elliptic curves over finite fields.&lt;br /&gt;
&lt;br /&gt;
* Fangguo Zhang, Zhuoran Zhang, Peidong Guan. “ECC&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt;: Error correcting code and elliptic curve based cryptosystem” &amp;#039;&amp;#039;Information Sciences&amp;#039;&amp;#039;, Volume 526, Elsevier, July 2020, Pages 301-320. https://www.sciencedirect.com/science/article/abs/pii/S0020025520302498&lt;br /&gt;
* Zhang, F., Zhang, Z. (2019). “ECC&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt;: Error Correcting Code and Elliptic Curve Based Cryptosystem.” In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11982. Springer, Cham. https://doi.org/10.1007/978-3-030-37337-5_17&lt;br /&gt;
* Minder, Lorenz. “Cryptography based on error correcting codes.” (2007). https://www.semanticscholar.org/paper/Cryptography-based-on-error-correcting-codes-Minder/cfa7db88c6e8e85819156b5ea36cdae4fb0e99dc&lt;br /&gt;
&lt;br /&gt;
The references in the abstracts of these papers to code-based [[strong cryptography]] as having “aroused wide public concern” are openly hostile, but that is where we describe cryptography as a martial art.  That would more typically be a phrase of brothers with black belts in kung fu being concerned with police presence on the property, in the context of an academic abstract, which is indeed the case, given what we know of FBI’s lobbying of Congress and advocacy in federal court over any and all matters of cryptography in general.&lt;/div&gt;</summary>
		<author><name>Rational Point</name></author>
	</entry>
</feed>