Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem
暂无分享,去创建一个
[1] Madhu Sudan,et al. Decoding of Reed Solomon Codes beyond the Error-Correction Bound , 1997, J. Complex..
[2] Hideki Imai,et al. Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption , 1988, EUROCRYPT.
[3] Jacques Patarin,et al. Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88 , 1995, CRYPTO.
[4] Jacques Patarin,et al. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms , 1996, EUROCRYPT.
[5] Eli Biham,et al. Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R) , 2000, EUROCRYPT.
[6] Kwok-Yan Lam,et al. Cryptanalysis of "2 R" Schemes , 1999, CRYPTO.
[7] Amr M. Youssef,et al. On the Interpolation Attacks on Block Ciphers , 2000, FSE.
[8] Louis Goubin,et al. Asymmetric cryptography with S-Boxes , 1997, ICICS.
[9] Louis Goubin,et al. Trapdoor one-way permutations and multivariate polynominals , 1997, ICICS.
[10] Louis Goubin,et al. C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai , 1998, ASIACRYPT.
[11] Ye Ding-Feng,et al. Cryptanalysis of 2R schemes , 1999, CRYPTO 1999.
[12] Thomas Jakobson,et al. Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree , 1998, CRYPTO.
[13] Hideki Imai,et al. Algebraic Methods for Constructing Asymmetric Cryptosystems , 1985, AAECC.