Efficient Signature Schemes Based on Birational Permutations
暂无分享,去创建一个
[1] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.
[2] Atsushi Fujioka,et al. A public-key cryptosystem based on the difficulty of solving a system of nonlinear equations , 1988, Systems and Computers in Japan.
[3] Adi Shamir. On the generation of multivariate polynomials which are hard to factor , 1993, STOC '93.
[4] Jacques Stern,et al. Attacks on the Birational Permutation Signature Schemes , 1993, CRYPTO.
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[6] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[7] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[8] Whitfield Diffie,et al. Analysis of a Public Key Approach Based on Polynomial Substitution , 1985, CRYPTO.