Proposal of the Multivariate Public Key Cryptosystem Relying on the Difficulty of Factoring a Product of Two Large Prime Numbers
暂无分享,去创建一个
Kohtaro Tadaki | Shigeo Tsujii | Ryo Fujita | Masahito Gotaishi | S. Tsujii | K. Tadaki | Ryo Fujita | M. Gotaishi | Ryou Fujita
[1] Adi Shamir,et al. Efficient Signature Schemes Based on Birational Permutations , 1993, CRYPTO.
[2] Jacques Patarin,et al. Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88 , 1995, CRYPTO.
[3] Jacques Stern,et al. Attacks on the Birational Permutation Signature Schemes , 1993, CRYPTO.
[4] Hideki Imai,et al. Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption , 1988, EUROCRYPT.
[5] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[6] John J. Cannon,et al. The Magma Algebra System I: The User Language , 1997, J. Symb. Comput..
[7] Neal Koblitz,et al. Algebraic aspects of cryptography , 1998, Algorithms and computation in mathematics.
[8] Masao Kasahara,et al. A Construction of Public Key Cryptosystem for Realizing Ciphertext of Size 100 Bit and Digital Signature Scheme , 2004, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[9] Bart Preneel,et al. Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations , 2005, IACR Cryptol. ePrint Arch..
[10] Masao Kasahara,et al. A Construction of Public-Key Cryptosystem Based on Singular Simultaneous Equations , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[11] Atsushi Fujioka,et al. Public-key cryptosystem based on the difficulty of solving a system of nonlinear equations , 1987 .
[12] Jintai Ding,et al. Secure Electronic Voting , 2006, Advances in Information Security.
[13] Bo-Yin Yang,et al. l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography , 2007, Public Key Cryptography.
[14] Tadaki Kohtaro,et al. Construction of the Tsujii-Shamir-Kasahara (TSK) Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization , 2012 .
[15] Jacques Patarin,et al. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms , 1996, EUROCRYPT.