-
1
-
-
35248818760
-
A toolbox for cryptanalysis: Linear and affine equivalence algorithms
-
Lecture Notes in Computer Science. Eli Biham, editor, Springer
-
Alex Biryukov, Christophe De Cannière, An Braeken, and Bart Preneel. A toolbox for cryptanalysis: Linear and affine equivalence algorithms. In Advances in Cryptology - EUROCRYPT 2003, Lecture Notes in Computer Science, pages 33-50. Eli Biham, editor, Springer, 2003.
-
(2003)
Advances in Cryptology - EUROCRYPT 2003
, pp. 33-50
-
-
Biryukov, A.1
De Cannière, C.2
Braeken, A.3
Preneel, B.4
-
5
-
-
84946835010
-
Attacking the affine parts of SFlash
-
Cryptography and Coding - 8th IMA International Conference. B. Honary, editor, Springer
-
W. Geiselmann, R. Steinwandt, and Th. Beth. Attacking the affine parts of SFlash. In Cryptography and Coding - 8th IMA International Conference, volume 2260 of Lecture Notes in Computer Science, pages 355-359. B. Honary, editor, Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2260
, pp. 355-359
-
-
Geiselmann, W.1
Steinwandt, R.2
Beth, Th.3
-
6
-
-
84957693117
-
Unbalanced oil and vinegar signature schemes
-
Advances in Cryptology - EUROCRYPT 1999. Jacques Stern, editor, Springer
-
Aviad Kipnis, Jacques Patarin, and Louis Goubin. Unbalanced oil and vinegar signature schemes. In Advances in Cryptology - EUROCRYPT 1999, volume 1592 of Lecture Notes in Computer Science, pages 206-222. Jacques Stern, editor, Springer, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 206-222
-
-
Kipnis, A.1
Patarin, J.2
Goubin, L.3
-
7
-
-
84957060922
-
Cryptanalysis of the HFE public key cryptosystem
-
Advances in Cryptology - CRYPTO 1999. Michael Wiener, editor, Springer, http://citeseer.nj.nec.com/kipnis99cryptanalysis.html
-
Aviad Kipnis and Adi Shamir. Cryptanalysis of the HFE public key cryptosystem. In Advances in Cryptology - CRYPTO 1999, volume 1666 of Lecture Notes in Computer Science, pages 19-30. Michael Wiener, editor, Springer, 1999. http://www.minrank.org/hfesubreg.ps or http://citeseer.nj.nec.com/kipnis99cryptanalysis.html.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 19-30
-
-
Kipnis, A.1
Shamir, A.2
-
8
-
-
85033537496
-
Public quadratic polynomial-tuples for efficient signature verification and message-encryption
-
Advances in Cryptology - EUROCRYPT 1988. Christoph G. Günther, editor, Springer
-
Tsutomu Matsumoto and Hideki Imai. Public quadratic polynomial-tuples for efficient signature verification and message-encryption. In Advances in Cryptology - EUROCRYPT 1988, volume 330 of Lecture Notes in Computer Science, pages 419-545. Christoph G. Günther, editor, Springer, 1988.
-
(1988)
Lecture Notes in Computer Science
, vol.330
, pp. 419-545
-
-
Matsumoto, T.1
Imai, H.2
-
9
-
-
84957640013
-
Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt'88
-
Advances in Cryptology - CRYPTO 1995. Don Coppersmith, editor, Springer
-
Jacques Patarin. Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt'88. In Advances in Cryptology - CRYPTO 1995, volume 963 of Lecture Notes in Computer Science, pages 248-261. Don Coppersmith, editor, Springer, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.963
, pp. 248-261
-
-
Patarin, J.1
-
10
-
-
84955622221
-
Asymmetric cryptography with a hidden monomial
-
Advances in Cryptology - CRYPTO 1996. Neal Koblitz, editor, Springer
-
Jacques Patarin. Asymmetric cryptography with a hidden monomial. In Advances in Cryptology - CRYPTO 1996, volume 1109 of Lecture Notes in Computer Science, pages 45-60. Neal Koblitz, editor, Springer, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 45-60
-
-
Patarin, J.1
-
11
-
-
84947932132
-
Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): Two new families of asymmetric algorithms
-
Advances in Cryptology - EUROCRYPT 1996. Ueli Maurer, editor, Springer
-
Jacques Patarin. Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of asymmetric algorithms. In Advances in Cryptology - EUROCRYPT 1996, volume 1070 of Lecture Notes in Computer Science, pages 33-48. Ueli Maurer, editor, Springer, 1996. Extended Version: http://www.minrank.org/hfe.pdf.
-
(1996)
Lecture Notes in Computer Science
, vol.1070
, pp. 33-48
-
-
Patarin, J.1
-
12
-
-
0342430954
-
Trapdoor one-way permutations and multivariate polynomials
-
International Conference on Information Security and Cryptology 1997. International Communications and Information Security Association, Springer
-
Jacques Patarin and Louis Goubin. Trapdoor one-way permutations and multivariate polynomials. In International Conference on Information Security and Cryptology 1997, volume 1334 of Lecture Notes in Computer Science, pages 356-368. International Communications and Information Security Association, Springer, 1997. Extended Version: http://citeseer.nj.nec.com/patarin97trapdoor.html.
-
(1997)
Lecture Notes in Computer Science
, vol.1334
, pp. 356-368
-
-
Patarin, J.1
Goubin, L.2
-
13
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
October
-
Peter W. Shor. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 26(5): 1484-1509, October 1997.
-
(1997)
SIAM Journal on Computing
, vol.26
, Issue.5
, pp. 1484-1509
-
-
Shor, P.W.1
-
14
-
-
23944480020
-
-
June arXiv preprint server, 7 pages
-
Ilia Toli. Cryptanalysis of HFE, June 2003. arXiv preprint server, http://arxiv.org/abs/cs.CR/0305034, 7 pages.
-
(2003)
Cryptanalysis of HFE
-
-
Toli, I.1
-
15
-
-
84893474732
-
Asymmetric cryptography: Hidden field equations
-
P. Neittaanmäki, T. Rossi, S. Korotov, E. Oñate, J. Périaux, and D. Knörzer, editors, Jyväskylä University. 20 pages
-
Christopher Wolf and Bart Preneel. Asymmetric cryptography: Hidden field equations. In European Congress on Computational Methods in Applied Sciences and Engineering 2004- P. Neittaanmäki, T. Rossi, S. Korotov, E. Oñate, J. Périaux, and D. Knörzer, editors, Jyväskylä University, 2004. 20 pages, extended version: http://eprint.iacr.org/2004/072/.
-
(2004)
European Congress on Computational Methods in Applied Sciences and Engineering 2004
-
-
Wolf, C.1
Preneel, B.2
|