메뉴 건너뛰기




Volumn 3386, Issue , 2005, Pages 275-287

Large superfluous keys in multivariate quadratic asymmetric systems

Author keywords

Multivariate Quadratic Equations; Public Key Schemes

Indexed keywords

COMPUTATIONAL METHODS; DATA STORAGE EQUIPMENT; MATHEMATICAL TRANSFORMATIONS; QUADRATIC PROGRAMMING;

EID: 24144456530     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-30580-4_19     Document Type: Conference Paper
Times cited : (39)

References (16)
  • 1
    • 35248818760 scopus 로고    scopus 로고
    • A toolbox for cryptanalysis: Linear and affine equivalence algorithms
    • Lecture Notes in Computer Science. Eli Biham, editor, Springer
    • Alex Biryukov, Christophe De Cannière, An Braeken, and Bart Preneel. A toolbox for cryptanalysis: Linear and affine equivalence algorithms. In Advances in Cryptology - EUROCRYPT 2003, Lecture Notes in Computer Science, pages 33-50. Eli Biham, editor, Springer, 2003.
    • (2003) Advances in Cryptology - EUROCRYPT 2003 , pp. 33-50
    • Biryukov, A.1    De Cannière, C.2    Braeken, A.3    Preneel, B.4
  • 5
    • 84946835010 scopus 로고    scopus 로고
    • Attacking the affine parts of SFlash
    • Cryptography and Coding - 8th IMA International Conference. B. Honary, editor, Springer
    • W. Geiselmann, R. Steinwandt, and Th. Beth. Attacking the affine parts of SFlash. In Cryptography and Coding - 8th IMA International Conference, volume 2260 of Lecture Notes in Computer Science, pages 355-359. B. Honary, editor, Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2260 , pp. 355-359
    • Geiselmann, W.1    Steinwandt, R.2    Beth, Th.3
  • 6
    • 84957693117 scopus 로고    scopus 로고
    • Unbalanced oil and vinegar signature schemes
    • Advances in Cryptology - EUROCRYPT 1999. Jacques Stern, editor, Springer
    • Aviad Kipnis, Jacques Patarin, and Louis Goubin. Unbalanced oil and vinegar signature schemes. In Advances in Cryptology - EUROCRYPT 1999, volume 1592 of Lecture Notes in Computer Science, pages 206-222. Jacques Stern, editor, Springer, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 206-222
    • Kipnis, A.1    Patarin, J.2    Goubin, L.3
  • 7
    • 84957060922 scopus 로고    scopus 로고
    • Cryptanalysis of the HFE public key cryptosystem
    • Advances in Cryptology - CRYPTO 1999. Michael Wiener, editor, Springer, http://citeseer.nj.nec.com/kipnis99cryptanalysis.html
    • Aviad Kipnis and Adi Shamir. Cryptanalysis of the HFE public key cryptosystem. In Advances in Cryptology - CRYPTO 1999, volume 1666 of Lecture Notes in Computer Science, pages 19-30. Michael Wiener, editor, Springer, 1999. http://www.minrank.org/hfesubreg.ps or http://citeseer.nj.nec.com/kipnis99cryptanalysis.html.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 19-30
    • Kipnis, A.1    Shamir, A.2
  • 8
    • 85033537496 scopus 로고
    • Public quadratic polynomial-tuples for efficient signature verification and message-encryption
    • Advances in Cryptology - EUROCRYPT 1988. Christoph G. Günther, editor, Springer
    • Tsutomu Matsumoto and Hideki Imai. Public quadratic polynomial-tuples for efficient signature verification and message-encryption. In Advances in Cryptology - EUROCRYPT 1988, volume 330 of Lecture Notes in Computer Science, pages 419-545. Christoph G. Günther, editor, Springer, 1988.
    • (1988) Lecture Notes in Computer Science , vol.330 , pp. 419-545
    • Matsumoto, T.1    Imai, H.2
  • 9
    • 84957640013 scopus 로고
    • Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt'88
    • Advances in Cryptology - CRYPTO 1995. Don Coppersmith, editor, Springer
    • Jacques Patarin. Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt'88. In Advances in Cryptology - CRYPTO 1995, volume 963 of Lecture Notes in Computer Science, pages 248-261. Don Coppersmith, editor, Springer, 1995.
    • (1995) Lecture Notes in Computer Science , vol.963 , pp. 248-261
    • Patarin, J.1
  • 10
    • 84955622221 scopus 로고    scopus 로고
    • Asymmetric cryptography with a hidden monomial
    • Advances in Cryptology - CRYPTO 1996. Neal Koblitz, editor, Springer
    • Jacques Patarin. Asymmetric cryptography with a hidden monomial. In Advances in Cryptology - CRYPTO 1996, volume 1109 of Lecture Notes in Computer Science, pages 45-60. Neal Koblitz, editor, Springer, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 45-60
    • Patarin, J.1
  • 11
    • 84947932132 scopus 로고    scopus 로고
    • Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): Two new families of asymmetric algorithms
    • Advances in Cryptology - EUROCRYPT 1996. Ueli Maurer, editor, Springer
    • Jacques Patarin. Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of asymmetric algorithms. In Advances in Cryptology - EUROCRYPT 1996, volume 1070 of Lecture Notes in Computer Science, pages 33-48. Ueli Maurer, editor, Springer, 1996. Extended Version: http://www.minrank.org/hfe.pdf.
    • (1996) Lecture Notes in Computer Science , vol.1070 , pp. 33-48
    • Patarin, J.1
  • 12
    • 0342430954 scopus 로고    scopus 로고
    • Trapdoor one-way permutations and multivariate polynomials
    • International Conference on Information Security and Cryptology 1997. International Communications and Information Security Association, Springer
    • Jacques Patarin and Louis Goubin. Trapdoor one-way permutations and multivariate polynomials. In International Conference on Information Security and Cryptology 1997, volume 1334 of Lecture Notes in Computer Science, pages 356-368. International Communications and Information Security Association, Springer, 1997. Extended Version: http://citeseer.nj.nec.com/patarin97trapdoor.html.
    • (1997) Lecture Notes in Computer Science , vol.1334 , pp. 356-368
    • Patarin, J.1    Goubin, L.2
  • 13
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • October
    • Peter W. Shor. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 26(5): 1484-1509, October 1997.
    • (1997) SIAM Journal on Computing , vol.26 , Issue.5 , pp. 1484-1509
    • Shor, P.W.1
  • 14
    • 23944480020 scopus 로고    scopus 로고
    • June arXiv preprint server, 7 pages
    • Ilia Toli. Cryptanalysis of HFE, June 2003. arXiv preprint server, http://arxiv.org/abs/cs.CR/0305034, 7 pages.
    • (2003) Cryptanalysis of HFE
    • Toli, I.1
  • 15
    • 84893474732 scopus 로고    scopus 로고
    • Asymmetric cryptography: Hidden field equations
    • P. Neittaanmäki, T. Rossi, S. Korotov, E. Oñate, J. Périaux, and D. Knörzer, editors, Jyväskylä University. 20 pages
    • Christopher Wolf and Bart Preneel. Asymmetric cryptography: Hidden field equations. In European Congress on Computational Methods in Applied Sciences and Engineering 2004- P. Neittaanmäki, T. Rossi, S. Korotov, E. Oñate, J. Périaux, and D. Knörzer, editors, Jyväskylä University, 2004. 20 pages, extended version: http://eprint.iacr.org/2004/072/.
    • (2004) European Congress on Computational Methods in Applied Sciences and Engineering 2004
    • Wolf, C.1    Preneel, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.