Weakness on Cryptographic Schemes Based on Chained Codes | IEEE Conference Publication | IEEE Xplore