An Improved Medium-Field Multivariate Public-Key Encryption Scheme
暂无分享,去创建一个
[1] Louis Goubin,et al. Unbalanced Oil and Vinegar Signature Schemes , 1999, EUROCRYPT.
[2] Hideki Imai,et al. Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption , 1988, EUROCRYPT.
[3] J. Faugère. A new efficient algorithm for computing Gröbner bases (F4) , 1999 .
[4] Louis Goubin,et al. Trapdoor one-way permutations and multivariate polynominals , 1997, ICICS.
[5] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[6] Jacques Patarin,et al. Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88 , 1995, CRYPTO.
[7] Jacques Stern,et al. Attacks on the Birational Permutation Signature Schemes , 1993, CRYPTO.
[8] Lei Hu,et al. Breaking a New Instance of TTM Cryptosystems , 2006, ACNS.
[9] Ariel Shamir,et al. Cryptanalysis of the oil and vinegar signature scheme , 1998 .
[10] Bart Preneel,et al. Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC , 2004, SCN.
[11] Christopher Wolf,et al. Multivariate quadratic polynomials in public key cryptography , 2005, IACR Cryptol. ePrint Arch..
[12] Lei Hu,et al. High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems , 2007, Public Key Cryptography.
[13] N. Courtois,et al. Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations , 2000, EUROCRYPT.
[14] Feipei Lai,et al. A "Medium-Field" Multivariate Public-Key Encryption Scheme , 2006, CT-RSA.
[15] Jacques Patarin,et al. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms , 1996, EUROCRYPT.
[16] Feipei Lai,et al. Tractable Rational Map Signature , 2005, Public Key Cryptography.
[17] Bart Preneel,et al. Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations , 2005, IACR Cryptol. ePrint Arch..
[18] T. T. Moh,et al. A public key system with signature and master key functions , 1999 .
[19] Jintai Ding,et al. Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem , 2004, IACR Cryptol. ePrint Arch..