-
2
-
-
0018443657
-
A note on the complexity of cryptography
-
G. Brassard, A note on the complexity of cryptography, IEEE Tran. Inform. Theory, Vol. IT-25 (1979) pp. 232-233.
-
(1979)
IEEE Tran. Inform. Theory
, vol.IT-25
, pp. 232-233
-
-
Brassard, G.1
-
3
-
-
0042470638
-
Cryptanalysis, a survey of recent results
-
Gustavus J. Simmons, ed.
-
E. Brickell and A. Odlyzko, Cryptanalysis, A survey of recent results, Contemporary Cryptology (Gustavus J. Simmons, ed.), (1992) p. 506.
-
(1992)
Contemporary Cryptology
, pp. 506
-
-
Brickell, E.1
Odlyzko, A.2
-
4
-
-
85023205150
-
Matrix multiplication via arithmetic progressions
-
D. Coppersmith and S. Winograd, Matrix multiplication via arithmetic progressions, J. Symbolic Computation, Vol. 9 (1990) pp. 251-280.
-
(1990)
J. Symbolic Computation
, vol.9
, pp. 251-280
-
-
Coppersmith, D.1
Winograd, S.2
-
7
-
-
85033537496
-
Public quadratic polynomial-tuples for efficient signature-verification and message-encryption
-
Springer-Verlag
-
T. Matsumoto and H. Imai, Public quadratic polynomial-tuples for efficient signature-verification and message-encryption, EUROCRYPT'88, Springer-Verlag (1988) pp. 419-453.
-
(1988)
EUROCRYPT'88
, pp. 419-453
-
-
Matsumoto, T.1
Imai, H.2
-
8
-
-
0010537086
-
Asymmetric cryptography with S-boxes
-
LNCS, Springer-Verlag, 1334
-
J. Patarin, L. Goubin, Asymmetric cryptography with S-boxes, ICICS'97, LNCS, Springer-Verlag, 1334, pp. 369-380.
-
ICICS'97
, pp. 369-380
-
-
Patarin, J.1
Goubin, L.2
-
9
-
-
85032871579
-
An efficient identification scheme based on permuted kernels
-
A. Shamir, An efficient identification scheme based on permuted kernels, CRYPTO'89, pp. 606-609.
-
CRYPTO'89
, pp. 606-609
-
-
Shamir, A.1
-
10
-
-
84955595109
-
A new identification scheme based on syndrome decoding
-
J. Stern, A new identification scheme based on syndrome decoding, CRYPTO'93, pp. 13-21. Another Algorithm Previously T. Matsumoto and H. Imai have suggested another algorithm, completely different, which was broken in 1984. The knowledge of this other algorithm is not needed, but we give here its references and the reference of its attack in order to avoid confusion between the two algorithms of Matsumoto and Imai.
-
CRYPTO'93
, pp. 13-21
-
-
Stern, J.1
-
11
-
-
0348021825
-
A class of asymmetric crypto-systems based on polynomials over finite rings
-
St Jovite, Quebec, Canada, September 26-30, Abstracts of Papers
-
T. Matsumoto and H. Imai, A class of asymmetric crypto-systems based on polynomials over finite rings, IEEE Intern. Symp. Inform. Theory, St Jovite, Quebec, Canada, September 26-30, 1983, Abstracts of Papers, pp. 131-132.
-
(1983)
IEEE Intern. Symp. Inform. Theory
, pp. 131-132
-
-
Matsumoto, T.1
Imai, H.2
-
12
-
-
84939323131
-
Fast cryptanalysis of the Matsumoto-Imai public key scheme
-
P. Delsarte, Y. Desmedt, A. Odlyzko, and P. Piret, Fast cryptanalysis of the Matsumoto-Imai public key scheme, EUROCRYPT'84, pp. 142-149.
-
EUROCRYPT'84
, pp. 142-149
-
-
Delsarte, P.1
Desmedt, Y.2
Odlyzko, A.3
Piret, P.4
|