Cryptanalysis of Rational Multivariate Public Key Cryptosystems
暂无分享,去创建一个
[1] Phong Q. Nguyen. Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97 , 1999, CRYPTO.
[2] Whitfield Diffie,et al. Analysis of a Public Key Approach Based on Polynomial Substitution , 1985, CRYPTO.
[3] Tanja Lange,et al. Attacking and defending the McEliece cryptosystem , 2008, IACR Cryptol. ePrint Arch..
[4] Jintai Ding,et al. A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation , 2004, Public Key Cryptography.
[5] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] Kohtaro Tadaki,et al. Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key , 2004, IACR Cryptol. ePrint Arch..
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[9] Louis Goubin,et al. Cryptanalysis of the TTM Cryptosystem , 2000, ASIACRYPT.
[10] Oded Goldreich,et al. Public-Key Cryptosystems from Lattice Reduction Problems , 1996, CRYPTO.
[11] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[12] Jacques Patarin,et al. Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88 , 1995, CRYPTO.
[13] Louis Goubin,et al. Asymmetric cryptography with S-Boxes , 1997, ICICS.
[14] Louis Goubin,et al. Trapdoor one-way permutations and multivariate polynominals , 1997, ICICS.
[15] Rehan Akbani,et al. Elliptic curve cryptosystem and its applications , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
[16] Atsushi Fujioka,et al. A public-key cryptosystem based on the difficulty of solving a system of nonlinear equations , 1988, Systems and Computers in Japan.
[17] Jean-Charles Faugère,et al. Cryptanalysis of 2R- Schemes , 2006, CRYPTO.
[18] Feipei Lai,et al. Tractable Rational Map Signature , 2005, Public Key Cryptography.
[19] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[20] Jacques Patarin,et al. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms , 1996, EUROCRYPT.
[21] Ye Ding-Feng,et al. Cryptanalysis of 2R schemes , 1999, CRYPTO 1999.
[22] Hideki Imai,et al. Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption , 1988, EUROCRYPT.
[23] Oded Regev,et al. Lattice-Based Cryptography , 2006, CRYPTO.
[24] T. T. Moh,et al. A public key system with signature and master key functions , 1999 .
[25] Kwok-Yan Lam,et al. Cryptanalysis of "2 R" Schemes , 1999, CRYPTO.