메뉴 건너뛰기




Volumn 3386, Issue , 2005, Pages 244-257

Tractable rational map signature

Author keywords

Digital signature; Finite field; Multivariate; Public key; Tractable rational maps

Indexed keywords

ALGORITHMS; DATA PROCESSING; ELECTRONIC COMMERCE; FUNCTIONS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 24144455333     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-30580-4_17     Document Type: Conference Paper
Times cited : (21)

References (41)
  • 2
    • 33645607707 scopus 로고    scopus 로고
    • Complexity of Gröbner basis computations for regular overdetermined systems
    • a slightly modified preprint is accepted by the International Conference on Polynomial System Solving
    • M. Bardet, J.-C. Faugère, and B. Salvy, Complexity of Gröbner Basis Computations for Regular Overdetermined Systems, INRIA Rapport de Recherche No. 5049; a slightly modified preprint is accepted by the International Conference on Polynomial System Solving.
    • INRIA Rapport de Recherche No. 5049 , vol.5049
    • Bardet, M.1    Faugère, J.-C.2    Salvy, B.3
  • 4
    • 33749035540 scopus 로고    scopus 로고
    • Tame transformations signatures with topsy-turvy hashes
    • Taipei
    • J.-M. Chen and B.-Y. Yang, Tame Transformations Signatures With Topsy-Turvy Hashes, proc. IWAP 2002, Taipei.
    • Proc. IWAP 2002
    • Chen, J.-M.1    Yang, B.-Y.2
  • 5
    • 33645589742 scopus 로고    scopus 로고
    • A more secure and efficacious TTS scheme
    • ICISC 2003, full version at eprint.iacr.org/2003/160
    • J.-M. Chen and B.-Y. Yang, A More Secure and Efficacious TTS Scheme, ICISC 2003, LNCS v. 2971, pp. 320-338; full version at eprint.iacr.org/2003/160.
    • LNCS , vol.2971 , pp. 320-338
    • Chen, J.-M.1    Yang, B.-Y.2
  • 6
    • 84949030831 scopus 로고    scopus 로고
    • Attacks on the birational permutation signature schemes
    • Crypto 1993
    • D. Coppersmith, J. Stern, and S. Vaudenay, Attacks on the Birational Permutation Signature Schemes, Crypto 1993, LNCS v. 773, pp. 435-443.
    • LNCS , vol.773 , pp. 435-443
    • Coppersmith, D.1    Stern, J.2    Vaudenay, S.3
  • 7
    • 84958969583 scopus 로고    scopus 로고
    • Solving underdefined systems of multivariate quadratic equations
    • PKC 2002
    • N. Courtois, L. Goubin, W. Meier, and J. Tacier, Solving Underdefined Systems of Multivariate Quadratic Equations, PKC 2002, LNCS v. 2274, pp. 211-227
    • LNCS , vol.2274 , pp. 211-227
    • Courtois, N.1    Goubin, L.2    Meier, W.3    Tacier, J.4
  • 8
    • 33947128822 scopus 로고    scopus 로고
    • Generic attacks and the security of quartz
    • PKC 2003
    • N. Courtois, Generic Attacks and the Security of Quartz, PKC 2003, LNCS v. 2567, pp. 351-364.
    • LNCS , vol.2567 , pp. 351-364
    • Courtois, N.1
  • 10
    • 77649327985 scopus 로고    scopus 로고
    • Efficient algorithms for solving overdefined systems of multivariate polynomial equations
    • EUROCRYPT 2000
    • N. Courtois, A. Klimov, J. Patarin, and A. Shamir, Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations, EUROCRYPT 2000, LNCS v. 1807, pp. 392-407.
    • LNCS , vol.1807 , pp. 392-407
    • Courtois, N.1    Klimov, A.2    Patarin, J.3    Shamir, A.4
  • 11
    • 35248834096 scopus 로고    scopus 로고
    • About the XL algorithms over GF(2)
    • CT-RSA 2003
    • N. Courtois and J. Patarin, About the XL Algorithms over GF(2), CT-RSA 2003, LNCS v. 2612, pp. 141-157.
    • LNCS , vol.2612 , pp. 141-157
    • Courtois, N.1    Patarin, J.2
  • 13
    • 24944450905 scopus 로고    scopus 로고
    • The XL-algorithm and a conjecture from commutative algebra
    • preprint (to appear) and private communication
    • C. Diem, The XL-algorithm and a Conjecture from Commutative Algebra, preprint (to appear Asiacrypt 2004 and LNCS) and private communication.
    • Asiacrypt 2004 and LNCS
    • Diem, C.1
  • 14
    • 0017018484 scopus 로고    scopus 로고
    • New directions in cryptography
    • W. Diffie and M. Hellman, New Directions in Cryptography, IEEE Trans. Info. Theory, vol. IT-22, no. 6, pp. 644-654.
    • IEEE Trans. Info. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 15
    • 0033143274 scopus 로고    scopus 로고
    • A new efficient algorithm for computing Gröbner bases (F4)
    • J.-C. Faugére, A New Efficient Algorithm for Computing Gröbner Bases (F4), Journal of Pure and Applied Algebra, 139 (1999), pp. 61-88.
    • (1999) Journal of Pure and Applied Algebra , vol.139 , pp. 61-88
    • Faugére, J.-C.1
  • 16
    • 0036045901 scopus 로고    scopus 로고
    • A new efficient algorithm for computing Gröbner bases without reduction to zero (F5)
    • ACM Press
    • J.-C. Faugère, A New Efficient Algorithm for Computing Gröbner Bases without Reduction to Zero (F5), Proc. ISSAC 2002, pp. 75-83, ACM Press 2002.
    • (2002) Proc. ISSAC 2002 , pp. 75-83
    • Faugère, J.-C.1
  • 17
    • 35248840150 scopus 로고    scopus 로고
    • Algebraic cryptanalysis of Hidden Field Equations (HFE) cryptosystems using Gröbner bases
    • Crypto 2003
    • J.-C. Faugère and A. Joux, Algebraic Cryptanalysis of Hidden Field Equations (HFE) Cryptosystems Using Gröbner Bases, Crypto 2003, LNCS v. 2729, pp. 44-60.
    • LNCS , vol.2729 , pp. 44-60
    • Faugère, J.-C.1    Joux, A.2
  • 19
    • 84946835010 scopus 로고    scopus 로고
    • Attacking the affine parts of SPLASH
    • 8th International IMA Conference on Cryptography and Coding
    • W. Geiselmann, R. Steinwandt, and T. Beth, Attacking the Affine Parts of SPLASH, 8th International IMA Conference on Cryptography and Coding, LNCS v. 2260, pp. 355-359.
    • LNCS , vol.2260 , pp. 355-359
    • Geiselmann, W.1    Steinwandt, R.2    Beth, T.3
  • 21
    • 84937500998 scopus 로고    scopus 로고
    • Cryptanalysis of the TTM cryptosystem
    • Asiacrypt 2000
    • L. Goubin and N. Courtois, Cryptanalysis of the TTM cryptosystem, Asiacrypt 2000, LNCS v. 1976, pp. 44-57.
    • LNCS , vol.1976 , pp. 44-57
    • Goubin, L.1    Courtois, N.2
  • 22
    • 84957613067 scopus 로고    scopus 로고
    • Cryptanalysis of the oil and vinegar signature scheme
    • Crypto'98
    • A. Kipnis and A. Shamir, Cryptanalysis of the Oil and Vinegar Signature Scheme, Crypto'98, LNCS v. 1462, pp. 257-266
    • LNCS , vol.1462 , pp. 257-266
    • Kipnis, A.1    Shamir, A.2
  • 23
    • 84957693117 scopus 로고    scopus 로고
    • Unbalanced oil and vinegar sigature schemes
    • Crypto'99
    • A. Kipnis, J. Patarin, and L. Goubin, Unbalanced Oil and Vinegar Sigature Schemes, Crypto'99, LNCS v. 1592, pp. 206-222
    • LNCS , vol.1592 , pp. 206-222
    • Kipnis, A.1    Patarin, J.2    Goubin, L.3
  • 24
    • 84957060922 scopus 로고    scopus 로고
    • Cryptanalysis of the HFE public key cryptosystem by relinearization
    • Crypto'99
    • A. Kipnis and A. Shamir, Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization, Crypto'99, LNCS v. 1666, pp. 19-30
    • LNCS , vol.1666 , pp. 19-30
    • Kipnis, A.1    Shamir, A.2
  • 25
    • 85033537496 scopus 로고    scopus 로고
    • Public quadratic polynomial-tuples for efficient signature-verification and message-encryption
    • EUROCRYPT'88
    • T. Matsumoto and H. Imai, Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption, EUROCRYPT'88, LNCS v. 330, pp. 419-453.
    • LNCS , vol.330 , pp. 419-453
    • Matsumoto, T.1    Imai, H.2
  • 30
    • 84957640013 scopus 로고    scopus 로고
    • Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt'88
    • Crypto'95
    • J. Patarin, Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88, Crypto'95, LNCS v. 963, pp. 248-261.
    • LNCS , vol.963 , pp. 248-261
    • Patarin, J.1
  • 31
    • 84947932132 scopus 로고    scopus 로고
    • Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP) two new families of asymmetric algorithms
    • EUROCRYPT'96
    • J. Patarin, Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP) Two New Families of Asymmetric Algorithms, EUROCRYPT'96, LNCS v. 1070, pp. 33-48.
    • LNCS , vol.1070 , pp. 33-48
    • Patarin, J.1
  • 32
    • 84957654670 scopus 로고    scopus 로고
    • Improved algorithm for isomorphisms of polynomials
    • EUROCRYPT'98
    • J. Patarin, L. Goubin, N. Courtois, Improved Algorithm for Isomorphisms of Polynomials, EUROCRYPT'98, LNCS v. 1403, pp. 184-200.
    • LNCS , vol.1403 , pp. 184-200
    • Patarin, J.1    Goubin, L.2    Courtois, N.3
  • 33
    • 84937576636 scopus 로고    scopus 로고
    • QUARTZ, 128-bit long digital signatures
    • CT-RSA 2001
    • J. Patarin, N. Courtois, and L. Goubin, QUARTZ, 128-Bit Long Digital Signatures, CT-RSA 2001, LNCS v. 2020, pp. 282-297. Updated version available at http://www.cryptonessie.org.
    • LNCS , vol.2020 , pp. 282-297
    • Patarin, J.1    Courtois, N.2    Goubin, L.3
  • 34
    • 84937571034 scopus 로고    scopus 로고
    • FLASH, a fast multivariate signature algorithm
    • CT-RSA 2001
    • J. Patarin, N. Courtois, and L. Goubin, FLASH, a Fast Multivariate Signature Algorithm, CT-RSA 2001, LNCS v. 2020, pp. 298-307. Updated version available at http://www.cryptonessie.org.
    • LNCS , vol.2020 , pp. 298-307
    • Patarin, J.1    Courtois, N.2    Goubin, L.3
  • 35
    • 35248849882 scopus 로고    scopus 로고
    • Factoring large numbers with the TWIRL device
    • Crypto 2003
    • A. Shamir and E. Tromer, Factoring Large Numbers with the TWIRL Device, Crypto 2003, LNCS v. 2729, pp. 1-26.
    • LNCS , vol.2729 , pp. 1-26
    • Shamir, A.1    Tromer, E.2
  • 39
    • 79952541213 scopus 로고    scopus 로고
    • All in the XL family: Theory and practice
    • to appear at
    • B.-Y. Yang and J.-M. Chen, All in the XL Family: Theory and Practice, to appear at ICISC 2004 and LNCS.
    • ICISC 2004 and LNCS
    • Yang, B.-Y.1    Chen, J.-M.2
  • 40
    • 35048900285 scopus 로고    scopus 로고
    • TTS: High-speed signatures on a low-end smart card
    • Proc. CHES '04
    • B.-Y. Yang, Y.-H. Chen, and J.-M. Chen, TTS: High-Speed Signatures on a Low-End Smart Card, Proc. CHES '04, LNCS v. 3156, pp. 371-385.
    • LNCS , vol.3156 , pp. 371-385
    • Yang, B.-Y.1    Chen, Y.-H.2    Chen, J.-M.3
  • 41
    • 33646811417 scopus 로고    scopus 로고
    • On asymptotic security estimates in XL and Gröbner bases-related algebraic cryptanalysis
    • ICICS 2004
    • B.-Y. Yang, J.-M. Chen, and N. Courtois, On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis, ICICS 2004, LNCS v. 3269, pp. 401-413.
    • LNCS , vol.3269 , pp. 401-413
    • Yang, B.-Y.1    Chen, J.-M.2    Courtois, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.