Simple Matrix Scheme for Encryption
暂无分享,去创建一个
Jintai Ding | Shaohua Tang | Chengdong Tao | Adama Diene | Shaohua Tang | Jintai Ding | Chengdong Tao | A. Diene
[1] John J. Cannon,et al. The Magma Algebra System I: The User Language , 1997, J. Symb. Comput..
[2] Ueli Maurer,et al. Advances in Cryptology — EUROCRYPT ’96 , 2001, Lecture Notes in Computer Science.
[3] W. J. Thron,et al. Encyclopedia of Mathematics and its Applications. , 1982 .
[4] Jacques Patarin,et al. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms , 1996, EUROCRYPT.
[5] Lei Hu,et al. High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems , 2007, Public Key Cryptography.
[6] Tatsuaki Okamoto,et al. Advances in Cryptology — ASIACRYPT 2000 , 2000, Lecture Notes in Computer Science.
[7] Ludovic Perret,et al. Cryptanalysis of MinRank , 2008, CRYPTO.
[8] Enrico Thomae,et al. A Generalization of the Rainbow Band Separation Attack and its Applications to Multivariate Schemes , 2012, IACR Cryptol. ePrint Arch..
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[10] Chen-Mou Cheng,et al. New Differential-Algebraic Attacks and Reparametrization of Rainbow , 2008, ACNS.
[11] Rudolf Lide,et al. Finite fields , 1983 .
[12] Elisabeth Oswald,et al. A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework , 2011, CRYPTO.
[13] Adi Shamir,et al. Cryptanalysis of the Oil & Vinegar Signature Scheme , 1998, CRYPTO.
[14] David Pointcheval. Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings , 2006, CT-RSA.
[15] Louis Goubin,et al. Cryptanalysis of the TTM Cryptosystem , 2000, ASIACRYPT.
[16] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[17] T. T. Moh,et al. A public key system with signature and master key functions , 1999 .
[18] Adi Shamir,et al. Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization , 1999, CRYPTO.
[19] Hideki Imai,et al. Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption , 1988, EUROCRYPT.
[20] Jacques Patarin,et al. Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88 , 1995, CRYPTO.
[21] Hugo Krawczyk,et al. Advances in Cryptology - CRYPTO '98 , 1998 .
[22] Tatsuaki Okamoto,et al. Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings , 2007, Public Key Cryptography.
[23] Bo-Yin Yang,et al. Multivariate Public Key Cryptography , 2009 .
[24] Luk Bettale,et al. Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants , 2011, Public Key Cryptography.
[25] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[26] Jintai Ding,et al. MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals , 2009, ICISC.
[27] Jintai Ding,et al. MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis , 2009, Symmetric Cryptography.
[28] Feipei Lai,et al. A "Medium-Field" Multivariate Public-Key Encryption Scheme , 2006, CT-RSA.
[29] Louis Goubin,et al. Unbalanced Oil and Vinegar Signature Schemes , 1999, EUROCRYPT.
[30] Dong Hoon Lee,et al. Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers , 2010, ICISC.
[31] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[32] Martijn Stam. Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions , 2008, CRYPTO.
[33] Jintai Ding,et al. Inverting HFE Systems Is Quasi-Polynomial for All Fields , 2011, CRYPTO.
[34] J. Faugère. A new efficient algorithm for computing Gröbner bases (F4) , 1999 .
[35] Jintai Ding,et al. Algebraic Attack on HFE Revisited , 2008, ISC.
[36] Niklaus Wirth,et al. Advances in Cryptology — EUROCRYPT ’88 , 2000, Lecture Notes in Computer Science.
[37] Jintai Ding,et al. MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy , 2008, PQCrypto.
[38] Rosario Gennaro,et al. Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings , 2011, Public Key Cryptography.