Cryptanalysis of the Bisectional MQ Equations System
暂无分享,去创建一个
Bo Zhao | Yongzhe Zhao | Xiaoyi Zhou | Wencai Du | Jixin Ma | Mingrui Chen
[1] Hideki Imai,et al. Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption , 1988, EUROCRYPT.
[2] Jacques Patarin. Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'98 , 2000, Des. Codes Cryptogr..
[3] Nicolas Courtois,et al. Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt , 2002, ICISC.
[4] Jacques Patarin,et al. Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88 , 1995, CRYPTO.
[5] Louis Goubin,et al. C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai , 1998, ASIACRYPT.
[6] Yong Feng,et al. A New Efficient Algorithm for Solving Systems of Multivariate Polynomial Equations , 2005, IACR Cryptol. ePrint Arch..
[7] Jintai Ding,et al. Inoculating Multivariate Schemes Against Differential Attacks , 2006, Public Key Cryptography.
[8] Christopher Wolf,et al. Multivariate quadratic polynomials in public key cryptography , 2005, IACR Cryptol. ePrint Arch..
[9] Louis Goubin,et al. Unbalanced Oil and Vinegar Signature Schemes , 1999, EUROCRYPT.
[10] Maurice Herlihy,et al. Axioms for concurrent objects , 1987, POPL '87.
[11] Jintai Ding,et al. Cryptanalysis of Rational Multivariate Public Key Cryptosystems , 2008, PQCrypto.
[12] A. Shamir,et al. Cryptanalysis of the HFE Public Key Cryptosystem , 1999 .
[13] Jintai Ding,et al. Square-Vinegar Signature Scheme , 2008, PQCrypto.
[14] Robert H. Deng,et al. Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings , 2005, ISPEC.
[15] Omessaad Hamdi,et al. Hidden Field Equations Cryptosystem Performances , 2006, IEEE International Conference on Computer Systems and Applications, 2006..
[16] Louis Goubin,et al. Cryptanalysis of the TTM Cryptosystem , 2000, ASIACRYPT.
[17] Adi Shamir,et al. Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations , 2000, EUROCRYPT.
[18] Jintai Ding,et al. Multivariate Public Key Cryptosystems (Advances in Information Security) , 2006 .
[19] Bart Preneel,et al. On the security of stepwise triangular systems , 2006, Des. Codes Cryptogr..
[20] Jacques Stern,et al. Differential Cryptanalysis for Multivariate Schemes , 2005, EUROCRYPT.
[21] Jintai Ding,et al. Complexity Estimates for the F4 Attack on the Perturbed Matsumoto-Imai Cryptosystem , 2005, IMACC.
[22] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[23] Jintai Ding,et al. Secure Electronic Voting , 2006, Advances in Information Security.