Quasigroups and their applications in cryptography
暂无分享,去创建一个
[1] Danilo Gligoroski. Stream cipher based on quasigroup string transformations in Zp* , 2004, ArXiv.
[2] Danilo Gligoroski,et al. Using quasigroups for one one secure encoding , 2002 .
[3] G. Mullen,et al. Discrete Mathematics Using Latin Squares , 1998, The Mathematical Gazette.
[4] J. Dénes,et al. Latin squares and their applications , 1974 .
[5] Václav Snásel,et al. Hash Functions Based on Large Quasigroups , 2009, ICCS.
[6] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[7] Bruce Schneier,et al. Second Preimages on n-bit Hash Functions for Much Less than 2n Work , 2005, IACR Cryptol. ePrint Arch..
[8] Smile Markovski,et al. Quasigroup String Transformations and Hash Function Design , 2009, ICT Innovations.
[9] Jonathan D. H. Smith. An Introduction to Quasigroups and Their Representations , 2006 .
[10] J. Dénes. On Latin squares and a digital encrypting communication system , 2000 .
[11] Antoine Joux,et al. Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions , 2004, CRYPTO.
[12] Jean-Sébastien Coron,et al. Merkle-Damgård Revisited: How to Construct a Hash Function , 2005, CRYPTO.
[13] Ljupco Kocarev,et al. Error-Correcting Codes Based on Quasigroups , 2007, 2007 16th International Conference on Computer Communications and Networks.
[14] Peter J. Cameron,et al. A Collection of Contributions in Honour of Jack Van Lint , 1992 .
[15] Jintai Ding,et al. Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL , 2008, IACR Cryptol. ePrint Arch..
[16] R. Moufang,et al. Zur Struktur von Alternativkörpern , 1935 .
[17] Ljupco Kocarev,et al. Edon-R, An Infinite Family of Cryptographic Hash Functions , 2009, Int. J. Netw. Secur..
[18] Danilo Gligoroski,et al. The Multivariate Probabilistic Encryption Scheme MQQ-ENC , 2012, IACR Cryptol. ePrint Arch..
[19] Jonathan D. H. Smith,et al. Quasigroups and loops : theory and applications , 1990 .
[20] Danilo Gligoroski,et al. Edon-$\Cal R (256,384,512)$ -- an efficient implementation of Edon-$\Cal R$ family of cryptographic hash functions , 2008 .
[21] Josef Pieprzyk,et al. A Message Authentication Code Based on Latin Squares , 1997, ACISP.
[22] Jennifer Seberry,et al. Encryption methods based on combinatorial designs , 1986 .
[23] Victor A. Shcherbacov,et al. Elements of Quasigroup Theory and Applications , 2017 .
[24] Smile Markovski,et al. Shapeless Quasigroups Derived by Feistel Orthomorphisms , 2012 .
[26] Danilo Gligoroski,et al. Edon-R(256, 384, 512) - an Efficient Implementation of Edon-R} Family of Cryptographic Hash Functions , 2007, IACR Cryptol. ePrint Arch..
[27] Danilo Gligoroski,et al. The Stream Cipher Edon80 , 2008, The eSTREAM Finalists.
[28] Victor Shcherbacov,et al. Elements of quasigroup theory and some its applications in code theory and cryptology , 2003 .
[29] Stefan Lucks,et al. A Failure-Friendly Design Principle for Hash Functions , 2005, ASIACRYPT.
[30] Martin Hell,et al. A Key Recovery Attack on Edon80 , 2007, ASIACRYPT.
[31] A. Donald Keedwell,et al. A new authentication scheme based on latin squares , 1992, Discret. Math..
[32] Ji Li,et al. Collision attack on NaSHA-512 , 2008, IACR Cryptol. ePrint Arch..
[33] Stefan Lucks,et al. Design Principles for Iterated Hash Functions , 2004, IACR Cryptol. ePrint Arch..
[34] Mariko Hagita,et al. A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software , 2007, Selected Areas in Cryptography.
[35] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[37] A. Sade. Groupoï des automorphes par le groupe cyclique , 1957 .
[38] N. Courtois,et al. Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations , 2000, EUROCRYPT.
[39] Smile Markovski,et al. Generating huge quasigroups from small non-linear bijections via extended Feistel function , 2009 .
[40] Anton Suschkewitsch. On a generalization of the associative law , 1929 .
[41] Danilo Gligoroski,et al. Quasigroups as Boolean Functions, Their Equation Systems and Gröbner Bases , 2009, Gröbner Bases, Coding, and Cryptography.
[42] Verica Bakeva,et al. QUASIGROUP STRING PROCESSING: PART 4 , 1999 .
[43] Vesna Dimitrova,et al. Block Cipher Defined by Matrix Presentation of Quasigroups , 2021, IACR Cryptol. ePrint Arch..
[44] Czesław Kościelny. Generating quasigroups for cryptographic applications , 2002 .
[45] Ljupco Kocarev,et al. Unbiased Random Sequences from Quasigroup String Transformations , 2005, FSE.
[46] Victor Shcherbacov. ON SOME KNOWN POSSIBLE APPLICATIONS OF QUASIGROUPS IN CRYPTOLOGY , 2003 .
[47] A. D. Keedwell,et al. Some applications of non-associative algebraic systems in cryptology , 2001 .
[48] Danilo Gligoroski,et al. On a Conditional Collision Attack on NaSHA-512 , 2009, IACR Cryptol. ePrint Arch..
[49] Verica Bakeva,et al. On Random Error Correcting Codes Based on Quasigroups , 2011 .
[50] A. D. Keedwell,et al. Latin Squares: New Developments in the Theory and Applications , 1991 .
[51] R. H. Bruck. A Survey of Binary Systems , 1971 .
[52] Dengguo Feng,et al. Boolean Functions and Their Applications in Cryptography , 2016, Advances in Computer Science and Technology.
[53] J. Markovski,et al. On Quasigroup Pseudo Random Sequence Generators , 2003 .
[54] Mohamed El-Hadedy,et al. Cryptographic hash function Edon-R′ , 2009, 2009 Proceedings of the 1st International Workshop on Security and Communication Networks.
[55] Adi Shamir,et al. A New Class of Invertible Mappings , 2002, CHES.
[56] Danilo Gligoroski,et al. MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme , 2011, INTRUST.
[57] Andrew W. Appel,et al. Formal aspects of mobile code security , 1999 .
[58] Danilo Gligoroski,et al. A Public Key Block Cipher Based on Multivariate Quadratic Quasigroups , 2008, IACR Cryptol. ePrint Arch..
[59] Eric W. Weisstein. Cryptographic Hash Function , 2000 .
[60] 조위덕. Cryptography , 1987, The Official (ISC)2 SSCP CBK Reference.
[61] Danilo Gligoroski,et al. A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems , 2014, Public Key Cryptography.
[62] Danilo Gligoroski,et al. Construction of Optimal 4-bit S-boxes by Quasigroups of Order 4 , 2012, SECURWARE 2012.
[63] Mariko Hagita,et al. CryptMT3 Stream Cipher , 2008, The eSTREAM Finalists.
[64] Danilo Gligoroski,et al. Multivariate quadratic trapdoor functions based on multivariate quadratic quasigroups , 2008 .
[65] John Kelsey,et al. Herding Hash Functions and the Nostradamus Attack , 2006, EUROCRYPT.
[66] Serge Vaudenay,et al. Links Between Differential and Linear Cryptanalysis , 1994, EUROCRYPT.
[67] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.