Cryptanalysis of HFE with Internal Perturbation
暂无分享,去创建一个
[1] Hideki Imai,et al. Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption , 1988, EUROCRYPT.
[2] Nicolas Courtois,et al. The Security of Hidden Field Equations (HFE) , 2001, CT-RSA.
[3] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[4] David Naccache,et al. Topics in Cryptology — CT-RSA 2001 , 2001, Lecture Notes in Computer Science.
[5] Serge Vaudenay. Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings , 2005, Public Key Cryptography.
[6] Douglas R. Stinson,et al. Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.
[7] Cynthia Dwork,et al. Advances in Cryptology – CRYPTO 2020: 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III , 2020, Annual International Cryptology Conference.
[8] Adi Shamir,et al. Efficient Signature Schemes Based on Birational Permutations , 1993, CRYPTO.
[9] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[10] Rajeev Motwani,et al. Randomized Algorithms: Tail Inequalities , 1995 .
[11] Antoine Joux,et al. Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases , 2003, CRYPTO.
[12] Jintai Ding,et al. Cryptanalysis of HFEv and Internal Perturbation of HFE , 2005, Public Key Cryptography.
[13] Colin Boyd,et al. Cryptography and Coding , 1995, Lecture Notes in Computer Science.
[14] Bart Preneel. New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report , 2002, Public Key Cryptography.
[15] Robin Milner,et al. On Observing Nondeterminism and Concurrency , 1980, ICALP.
[16] Jacques Patarin,et al. Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88 , 1995, CRYPTO.
[17] Adi Shamir,et al. Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization , 1999, CRYPTO.
[18] Jacques Stern,et al. An Efficient Provable Distinguisher for HFE , 2006, ICALP.
[19] Jacques Stern,et al. Differential Cryptanalysis for Multivariate Schemes , 2005, EUROCRYPT.
[20] Jintai Ding,et al. Complexity Estimates for the F4 Attack on the Perturbed Matsumoto-Imai Cryptosystem , 2005, IMACC.
[21] Jintai Ding,et al. A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation , 2004, Public Key Cryptography.
[22] Russ Bubley,et al. Randomized algorithms , 1995, CSUR.
[23] Whitfield Diffie,et al. Analysis of a Public Key Approach Based on Polynomial Substitution , 1985, CRYPTO.
[24] Robert H. Deng,et al. Public Key Cryptography – PKC 2004 , 2004, Lecture Notes in Computer Science.
[25] Ueli Maurer,et al. Advances in Cryptology — EUROCRYPT ’96 , 2001, Lecture Notes in Computer Science.
[26] Antoine Joux,et al. Inverting HFE Is Quasipolynomial , 2006, CRYPTO.
[27] Jacques Patarin,et al. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms , 1996, EUROCRYPT.
[28] Dan Boneh,et al. Advances in Cryptology - CRYPTO 2003 , 2003, Lecture Notes in Computer Science.
[29] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.