Proposal of PPS Multivariate Public Key Cryptosystems
暂无分享,去创建一个
Masao Kasahara | Kohtaro Tadaki | Shigeo Tsujii | Masahito Gotaishi | Ryou Fujita | M. Kasahara | S. Tsujii | K. Tadaki | M. Gotaishi | Ryou Fujita
[1] Magnus Daum,et al. On the Security of HFE, HFEv- and Quartz , 2003, Public Key Cryptography.
[2] J. Faugère,et al. On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations , 2004 .
[3] Bart Preneel,et al. Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC , 2004, SCN.
[4] Kohtaro Tadaki,et al. Proposal for Piece in Hand Matrix: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[5] Bo-Yin Yang,et al. l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography , 2007, Public Key Cryptography.
[6] Antoine Joux,et al. Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases , 2003, CRYPTO.
[7] Hideki Imai,et al. Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption , 1988, EUROCRYPT.
[8] Jintai Ding,et al. A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation , 2004, Public Key Cryptography.
[9] Kohtaro Tadaki,et al. Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems , 2008, PQCrypto.
[10] Jacques Stern,et al. Attacks on the Birational Permutation Signature Schemes , 1993, CRYPTO.
[11] Jacques Patarin,et al. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms , 1996, EUROCRYPT.
[12] Ariel Shamir,et al. Cryptanalysis of the oil and vinegar signature scheme , 1998 .
[13] Bo-Yin Yang,et al. TTS: Rank Attacks in Tame-Like Multivariate PKCs , 2004, IACR Cryptol. ePrint Arch..
[14] B. Salvy,et al. Asymptotic Behaviour of the Degree of Regularity of Semi-Regular Polynomial Systems , 2022 .
[15] Louis Goubin,et al. Cryptanalysis of the TTM Cryptosystem , 2000, ASIACRYPT.
[16] Adi Shamir,et al. Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations , 2000, EUROCRYPT.
[17] Tadaki Kohtaro,et al. Proposal of MOCHIGOMA(Piece in Hand) Concept for Multivariate Type Public Key Cryptosystem , 2004 .
[18] Jacques Stern,et al. Differential Cryptanalysis for Multivariate Schemes , 2005, EUROCRYPT.
[19] Jintai Ding,et al. Complexity Estimates for the F4 Attack on the Perturbed Matsumoto-Imai Cryptosystem , 2005, IMACC.
[20] Masao Kasahara,et al. A Construction of Public Key Cryptosystem for Realizing Ciphertext of Size 100 Bit and Digital Signature Scheme , 2004, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[21] T. T. Moh,et al. A public key system with signature and master key functions , 1999 .
[22] Masao Kasahara,et al. A Construction of Public-Key Cryptosystem Based on Singular Simultaneous Equations , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[23] Jintai Ding,et al. Cryptanalysis of Rational Multivariate Public Key Cryptosystems , 2008, PQCrypto.
[24] Jacques Patarin,et al. Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88 , 1995, CRYPTO.
[25] Kohtaro Tadaki,et al. Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key , 2004, IACR Cryptol. ePrint Arch..
[26] Toshinobu Kaneko,et al. Security Enhancement of Various MPKCs by 2-Layer Nonlinear Piece in Hand Method , 2009, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[27] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[28] Jintai Ding,et al. Inoculating Multivariate Schemes Against Differential Attacks , 2006, Public Key Cryptography.
[29] Louis Goubin,et al. Unbalanced Oil and Vinegar Signature Schemes , 1999, EUROCRYPT.
[30] Kohtaro Tadaki,et al. Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems , 2008, IACR Cryptol. ePrint Arch..
[31] Adi Shamir,et al. Efficient Signature Schemes Based on Birational Permutations , 1993, CRYPTO.
[32] Jacques Stern,et al. Practical Cryptanalysis of SFLASH , 2007, CRYPTO.