Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems
暂无分享,去创建一个
Stanislav Bulygin | Albrecht Petzoldt | Christopher Wolf | Enrico Thomae | Albrecht Petzoldt | S. Bulygin | Christopher Wolf | Enrico Thomae
[1] Ariel Shamir,et al. Cryptanalysis of the oil and vinegar signature scheme , 1998 .
[2] Christopher Wolf,et al. Multivariate quadratic polynomials in public key cryptography , 2005, IACR Cryptol. ePrint Arch..
[3] Andrey Bogdanov,et al. Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves? , 2008, IACR Cryptol. ePrint Arch..
[4] Bart Preneel,et al. Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC , 2004, SCN.
[5] Adi Shamir,et al. Cryptanalysis of the Oil & Vinegar Signature Scheme , 1998, CRYPTO.
[6] Bart Preneel,et al. Superfluous Keys in Multivariate Quadratic Asymmetric Systems , 2004, IACR Cryptol. ePrint Arch..
[7] Bart Preneel,et al. Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems , 2005, Public Key Cryptography.
[8] Bo-Yin Yang,et al. Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS , 2005, ACISP.
[9] J. Faugère. A new efficient algorithm for computing Gröbner bases (F4) , 1999 .
[10] Bart Preneel,et al. A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes , 2005, CT-RSA.
[11] Chen-Mou Cheng,et al. Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems , 2006, SPC.
[12] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[13] Stanislav Bulygin,et al. Linear Recurring Sequences for the UOV Key Generation , 2011, Public Key Cryptography.
[14] Luk Bettale,et al. Hybrid approach for solving multivariate systems over finite fields , 2009, J. Math. Cryptol..
[15] Stanislav Bulygin,et al. CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public Key , 2010, INDOCRYPT.
[16] Bart Preneel,et al. Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations , 2005, IACR Cryptol. ePrint Arch..
[17] Jan Camenisch,et al. Security in Communication Networks - SCN 2004 , 2004 .
[18] Jintai Ding,et al. Multivariate Public Key Cryptosystems (Advances in Information Security) , 2006 .
[19] Bart Preneel,et al. Equivalent keys in ℳultivariate uadratic public key systems , 2005, J. Math. Cryptol..
[20] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[21] Chen-Mou Cheng,et al. Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and lIC-Derivatives , 2008, PQCrypto.
[22] P. Erdös. On an extremal problem in graph theory , 1970 .
[23] Jean Charles Faugère,et al. A new efficient algorithm for computing Gröbner bases without reduction to zero (F5) , 2002, ISSAC '02.
[24] Chen-Mou Cheng,et al. SSE Implementation of Multivariate PKCs on Modern x86 CPUs , 2009, CHES.
[25] Bo-Yin Yang,et al. Multivariate Public Key Cryptography , 2009 .
[26] Louis Goubin,et al. Unbalanced Oil and Vinegar Signature Schemes , 1999, EUROCRYPT.
[27] Bo-Yin Yang,et al. Theoretical Analysis of XL over Small Fields , 2004, ACISP.
[28] Feipei Lai,et al. Similar Keys of Multivariate Quadratic Public Key Cryptosystems , 2005, CANS.
[29] Bo-Yin Yang,et al. All in the XL Family: Theory and Practice , 2004, ICISC.
[30] Bo-Yin Yang,et al. TTS: High-Speed Signatures on a Low-Cost Smart Card , 2004, CHES.