메뉴 건너뛰기




Volumn 2894, Issue , 2003, Pages 331-346

A traceable block cipher

Author keywords

Block ciphers; Collusion resistance; Matsumoto Imai; Multivariate cryptology; Symmetric cryptology; Traitor tracing

Indexed keywords

ITERATIVE METHODS; SECURITY OF DATA;

EID: 0344196672     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-40061-5_21     Document Type: Article
Times cited : (35)

References (19)
  • 2
    • 35248818760 scopus 로고    scopus 로고
    • A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms
    • Advances in Cryptology - EUROCRYPT 2003 (Eli Biham, ed.), Springer-Verlag
    • Alex Biryukov, Christophe De Canniere, An Braeken, and Bart Preneel, A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms, Advances in Cryptology - EUROCRYPT 2003 (Eli Biham, ed.), Lecture Notes in Computer Science, vol. 2656, Springer-Verlag, 2003, pp. 33-50.
    • (2003) Lecture Notes in Computer Science , vol.2656 , pp. 33-50
    • Biryukov, A.1    De Canniere, C.2    Braeken, A.3    Preneel, B.4
  • 3
    • 84957085257 scopus 로고
    • An Efficient Public Key Traitor Tracing Scheme
    • Advances in Cryptology - CRYPTO '99 (Michael Wiener, ed.), Springer-Verlag
    • Dan Boneh and Matthew Franklin, An Efficient Public Key Traitor Tracing Scheme, Advances in Cryptology - CRYPTO '99 (Michael Wiener, ed.), Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, 1994, pp. 338-353.
    • (1994) Lecture Notes in Computer Science , vol.1666 , pp. 338-353
    • Boneh, D.1    Franklin, M.2
  • 4
    • 84985922619 scopus 로고
    • Tracing Traitors
    • Advances in Cryptology - CRYPTO '94 (Yvo G. Desmedt, ed.), Springer-Verlag
    • Benny Chor, Amos Fiat, and Moni Naor, Tracing Traitors, Advances in Cryptology - CRYPTO '94 (Yvo G. Desmedt, ed.), Lecture Notes in Computer Science, vol. 839, Springer-Verlag, 1994, pp. 257-270.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 257-270
    • Chor, B.1    Fiat, A.2    Naor, M.3
  • 5
    • 21144457759 scopus 로고    scopus 로고
    • White-Box Cryptography and an AES Implementation
    • Selected Areas in Cryptography - SAC 2002 (K. Nyberg and H. Keys, eds.), Springer-Verlag
    • Stanley Chow, Philip Eisen, Harold Johnson, and Paul C. Van Oorschot, White-Box Cryptography and an AES Implementation, Selected Areas in Cryptography - SAC 2002 (K. Nyberg and H. Keys, eds.), Lecture Notes in Computer Science, vol. 2595, Springer-Verlag, 2002, pp. 250-270.
    • (2002) Lecture Notes in Computer Science , vol.2595 , pp. 250-270
    • Chow, S.1    Eisen, P.2    Johnson, H.3    Van Oorschot, P.C.4
  • 6
    • 84958969583 scopus 로고    scopus 로고
    • Solving Underdefined Systems of Multivariate Quadratic Equations
    • Public Key Cryptography - PKC 2002 (David Naccache and Pascal Paillier, eds.), Springer-Verlag
    • Nicolas Courtois, Louis Goubin, Willi Meier, and Jean-Daniel Tacier, Solving Underdefined Systems of Multivariate Quadratic Equations, Public Key Cryptography - PKC 2002 (David Naccache and Pascal Paillier, eds.), Lecture Notes in Computer Science, vol. 2274, Springer-Verlag, 2002, pp. 211-227.
    • (2002) Lecture Notes in Computer Science , vol.2274 , pp. 211-227
    • Courtois, N.1    Goubin, L.2    Meier, W.3    Tacier, J.-D.4
  • 7
    • 84947768941 scopus 로고    scopus 로고
    • -+ and HM: Variations around two schemes of T. Matsumoto and H. Imai
    • Advances in Cryptology - ASIACRYPT '98 (Kazuo Ohta and Dingyi Pei, eds.), Springer-Verlag
    • -+ and HM: Variations around two schemes of T. Matsumoto and H. Imai, Advances in Cryptology - ASIACRYPT '98 (Kazuo Ohta and Dingyi Pei, eds.), Lecture Notes in Computer Science, vol. 1514, Springer-Verlag, 1998, pp. 35-49.
    • (1998) Lecture Notes in Computer Science , vol.1514 , pp. 35-49
    • Courtois, N.1    Goubin, L.2    Patarin, J.3
  • 8
    • 77649327985 scopus 로고    scopus 로고
    • Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations
    • Advances in Cryptology - EUROCRYPT 2000 (Bart Preneel, ed.), Springer-Verlag
    • Nicolas Courtois, Alexander Klimov, Jacques Patarin, and Adi Shamir, Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations, Advances in Cryptology - EUROCRYPT 2000 (Bart Preneel, ed.), Lecture Notes in Computer Science, vol. 1807, Springer-Verlag, 2000, pp. 392-107.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 392-1107
    • Courtois, N.1    Klimov, A.2    Patarin, J.3    Shamir, A.4
  • 9
    • 35248824029 scopus 로고    scopus 로고
    • On the Security of HFE, HFEv- And Quartz
    • Public Key Cryptography - PKC 2003 (Yvo G. Desmedt, ed.), Springer-Verlag
    • Nicolas T. Courtois, Magnus Daum, and Patrick Felke, On the Security of HFE, HFEv- and Quartz, Public Key Cryptography - PKC 2003 (Yvo G. Desmedt, ed.), Lecture Notes in Computer Science, vol. 2567, Springer-Verlag, 2003, pp. 337-350.
    • (2003) Lecture Notes in Computer Science , vol.2567 , pp. 337-350
    • Courtois, N.T.1    Daum, M.2    Felke, P.3
  • 10
    • 35248840150 scopus 로고    scopus 로고
    • Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases
    • Advances in Cryptology - CRYPTO 2003 (Dan Boneh, ed.), Springer-Verlag
    • Jean-Charles Faugere and Antoine Joux, Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases, Advances in Cryptology - CRYPTO 2003 (Dan Boneh, ed.), Lecture Notes in Computer Science, vol. 2729, Springer-Verlag, 2003, pp. 44-60.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 44-60
    • Faugere, J.-C.1    Joux, A.2
  • 11
    • 84957060922 scopus 로고    scopus 로고
    • Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization
    • Advances in Cryptology - CRYPTO '99 (Michael Wiener, ed.), Springer-Verlag
    • Aviad Kipnis and Adi Shamir, Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization, Advances in Cryptology - CRYPTO '99 (Michael Wiener, ed.), Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, 1999, pp. 19-30.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 19-30
    • Kipnis, A.1    Shamir, A.2
  • 12
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • Advances in Cryptology - CRYPTO '99 (Michael Wiener, ed.), Springer-Verlag
    • Paul Kocher, Joshua Jaffe, and Benjamin Jun, Differential Power Analysis, Advances in Cryptology - CRYPTO '99 (Michael Wiener, ed.), Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, 1999, pp. 388-397.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 13
    • 85033537496 scopus 로고
    • Public Quadratic Polynomial-tuples for Efficient Signature Verification and Message Encryption
    • Advances in Cryptology - EUROCRYPT '88 (Cristoph G. Günther, ed.), Springer-Verlag
    • Tsutomu Matsumoto and Hideki Imai, Public Quadratic Polynomial-tuples for Efficient Signature Verification and Message Encryption, Advances in Cryptology - EUROCRYPT '88 (Cristoph G. Günther, ed.), Lecture Notes in Computer Science, vol. 330, Springer-Verlag, 1988, pp. 419-153.
    • (1988) Lecture Notes in Computer Science , vol.330 , pp. 419-1153
    • Matsumoto, T.1    Imai, H.2
  • 14
    • 84957617696 scopus 로고    scopus 로고
    • Threshold Traitor Tracing
    • Advances in Cryptology - CRYPTO '98 (Hugo Krawczyk, ed.), Springer-Verlag
    • Moni Naor and Benny Pinkas, Threshold Traitor Tracing, Advances in Cryptology - CRYPTO '98 (Hugo Krawczyk, ed.), Lecture Notes in Computer Science, vol. 1462, Springer-Verlag, 1998, pp. 502-517.
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 502-517
    • Naor, M.1    Pinkas, B.2
  • 15
    • 84957640013 scopus 로고
    • Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt '88
    • Advances in Cryptology - CRYPTO '95 (Vangalur S. Alagar and Maurice Nivat, eds.), Springer-Verlag
    • Jacques Patarin, Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt '88, Advances in Cryptology - CRYPTO '95 (Vangalur S. Alagar and Maurice Nivat, eds.), Lecture Notes in Computer Science, vol. 963, Springer-Verlag, 1995, pp. 248-261.
    • (1995) Lecture Notes in Computer Science , vol.963 , pp. 248-261
    • Patarin, J.1
  • 16
    • 84947932132 scopus 로고    scopus 로고
    • Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
    • Advances in Cryptology - EUROCRYPT 1996 (U. Maurer, ed.), Springer-Verlag
    • Jacques Patarin, Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms, Advances in Cryptology - EUROCRYPT 1996 (U. Maurer, ed.), Lecture Notes in Computer Science, vol. 1070, Springer-Verlag, 1996, pp. 33-48.
    • (1996) Lecture Notes in Computer Science , vol.1070 , pp. 33-48
    • Patarin, J.1
  • 17
    • 84957654670 scopus 로고    scopus 로고
    • Improved Algorithms for Isomorphisms of Polynomials
    • (Kaisa Nyberg, ed.)
    • Jacques Patarin, Louis Goubin, and Nicolas Courtois, Improved Algorithms for Isomorphisms of Polynomials, Advances in Cryptology - EUROCRYPT '98 (Kaisa Nyberg, ed.), vol. 1403, 1998, pp. 184-200.
    • (1998) Advances in Cryptology - EUROCRYPT '98 , vol.1403 , pp. 184-200
    • Patarin, J.1    Goubin, L.2    Courtois, N.3
  • 18
    • 0002016098 scopus 로고    scopus 로고
    • Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes
    • Douglas R. Stinson and Ruizhong Wei, Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes, SIAM Journal on Discrete Mathematics 11 (1998), no. 1, 41-53.
    • (1998) SIAM Journal on Discrete Mathematics , vol.11 , Issue.1 , pp. 41-53
    • Stinson, D.R.1    Wei, R.2
  • 19
    • 35248813851 scopus 로고    scopus 로고
    • available from the site of the NESSIE workshop
    • Specifications of SPLASH, available from the site of the NESSIE workshop at https://www.cosic.esat.kuleuven.ac.be/nessie/workshop/.
    • Specifications of SPLASH


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.