-
1
-
-
84861271490
-
Asymptotic expansion of the degree of regularity for semi-regular systems of equations
-
to be presented
-
M. Bardet, J.-C. Faugère, B. Salvy, and B.-Y. Yang, Asymptotic Expansion of the Degree of Regularity for Semi-Regular Systems of Equations, to be presented MEGA'05.
-
MEGA'05
-
-
Bardet, M.1
Faugère, J.-C.2
Salvy, B.3
Yang, B.-Y.4
-
2
-
-
24144434889
-
A study of the security of unbalanced oil and vinegar signature schemes
-
CT-RSA'05
-
A. Braeken, C. Wolf and B. Preneel, A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes, CT-RSA'05, LNCS 3376, pp. 29-43.
-
LNCS
, vol.3376
, pp. 29-43
-
-
Braeken, A.1
Wolf, C.2
Preneel, B.3
-
3
-
-
35048872782
-
A more secure and efficacious TTS scheme
-
ICISC'03
-
J.-M. Chen and B.-Y. Yang, A More Secure and Efficacious TTS Scheme, ICISC'03, LNCS 2971, pp. 320-338.
-
LNCS
, vol.2971
, pp. 320-338
-
-
Chen, J.-M.1
Yang, B.-Y.2
-
4
-
-
24144455333
-
Tractable rational map signature
-
PKC'05
-
C.-Y. Chou, Y.-H. Hu, F.-P. Lai, L.-C. Wang, and B.-Y. Yang, Tractable Rational Map Signature, PKC'05, LNCS 3386, pp. 244-257.
-
LNCS
, vol.3386
, pp. 244-257
-
-
Chou, C.-Y.1
Hu, Y.-H.2
Lai, F.-P.3
Wang, L.-C.4
Yang, B.-Y.5
-
5
-
-
84949030831
-
Attacks on the birational permutation signature schemes
-
Crypto'93
-
D. Coppersmith, J. Stern, and S. Vaudenay, Attacks on the Birational Permutation Signature Schemes, Crypto'93, LNCS 773, pp. 435-443.
-
LNCS
, vol.773
, pp. 435-443
-
-
Coppersmith, D.1
Stern, J.2
Vaudenay, S.3
-
6
-
-
84958969583
-
Solving underdefined systems of multivariate quadratic equations
-
PKC'02
-
N. Courtois, L. Goubin, W. Meier, and J. Tacier, Solving Underdefined Systems of Multivariate Quadratic Equations, PKC'02, LNCS 2274, pp. 211-227.
-
LNCS
, vol.2274
, pp. 211-227
-
-
Courtois, N.1
Goubin, L.2
Meier, W.3
Tacier, J.4
-
7
-
-
77649327985
-
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
-
Eurocrypt'00
-
N. Courtois, A. Klimov, J. Patarin, and A. Shamir, Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations, Eurocrypt'00, LNCS 1807, pp. 392-407.
-
LNCS
, vol.1807
, pp. 392-407
-
-
Courtois, N.1
Klimov, A.2
Patarin, J.3
Shamir, A.4
-
8
-
-
26444539989
-
The XL-algorithm and a conjecture from commutative algebra
-
Asiacrypt'04
-
C. Diem, The XL-algorithm and a conjecture from commutative algebra, Asiacrypt'04, LNCS 3329, pp. 338-353.
-
LNCS
, vol.3329
, pp. 338-353
-
-
Diem, C.1
-
9
-
-
68049097394
-
Rainbow, a new multivariate polynomial signature system
-
to appear
-
J. Ding and D. Schmidt, Rainbow, a new multivariate polynomial signature system, to appear at ACNS'05.
-
ACNS'05
-
-
Ding, J.1
Schmidt, D.2
-
10
-
-
24144432125
-
Cryptanalysis of HFEv and internal perturbation of HFE
-
PKC'05
-
J. Ding and D. Schmidt, Cryptanalysis of HFEv and Internal Perturbation of HFE, PKC'05, LNCS 3386, pp. 288-301.
-
LNCS
, vol.3386
, pp. 288-301
-
-
Ding, J.1
Schmidt, D.2
-
11
-
-
26444502248
-
Cryptanalysis of TTS and tame-like multivariable signature schemes
-
J. Ding and Z. Yin, Cryptanalysis of TTS and Tame-like Multivariable Signature Schemes, presentation at IWAP'04.
-
IWAP'04
-
-
Ding, J.1
Yin, Z.2
-
12
-
-
0036045901
-
A New efficient algorithm for computing gröbner bases without reduction to zero (F5)
-
ACM Press
-
J.-C. Faugère, A New Efficient Algorithm for Computing Gröbner Bases without Reduction to Zero (F5), Proceedings of ISSAC, ACM Press, 2002.
-
(2002)
Proceedings of ISSAC
-
-
Faugère, J.-C.1
-
13
-
-
35248840150
-
Algebraic cryptanalysis of Hidden Field Equations (HFE) cryptosystems using gröbner bases
-
Crypto 2003
-
J.-C. Faugère and A. Joux, Algebraic Cryptanalysis of Hidden Field Equations (HFE) Cryptosystems Using Gröbner Bases, Crypto 2003, LNCS 2729, pp. 44-60.
-
LNCS
, vol.2729
, pp. 44-60
-
-
Faugère, J.-C.1
Joux, A.2
-
14
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
CHES '04
-
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, Strong Authentication for RFID Systems Using the AES Algorithm, CHES '04, LNCS 3156, pp. 357-370.
-
LNCS
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
16
-
-
84937500998
-
Cryptanalysis of the TTM cryptosystem
-
Asiacrypt'00
-
L. Goubin and N. Courtois, Cryptanalysis of the TTM Cryptosystem, Asiacrypt'00, LNCS 1976, pp. 44-57.
-
LNCS
, vol.1976
, pp. 44-57
-
-
Goubin, L.1
Courtois, N.2
-
18
-
-
24144484756
-
Cryptanalysis of the tractable rational map cryptosystem
-
PKC'05
-
A. Joux, S. Kunz-Jacques, F. Muller, P.-M. Ricordel, Cryptanalysis of the Tractable Rational Map Cryptosystem, PKC'05, LNCS 3386, pp. 258-274.
-
LNCS
, vol.3386
, pp. 258-274
-
-
Joux, A.1
Kunz-Jacques, S.2
Muller, F.3
Ricordel, P.-M.4
-
19
-
-
84957693117
-
Unbalanced oil and vinegar signature schemes
-
Crypto'99
-
A. Kipnis, J. Patarin, and L. Goubin, Unbalanced Oil and Vinegar Signature Schemes, Crypto'99, LNCS 1592, pp. 206-222.
-
LNCS
, vol.1592
, pp. 206-222
-
-
Kipnis, A.1
Patarin, J.2
Goubin, L.3
-
20
-
-
84957613067
-
Cryptanalysis of the oil and vinegar signature scheme
-
Crypto'98
-
A. Kipnis and A. Shamir, Cryptanalysis of the Oil and Vinegar Signature Scheme, Crypto'98, LNCS 1462, pp. 257-266.
-
LNCS
, vol.1462
, pp. 257-266
-
-
Kipnis, A.1
Shamir, A.2
-
21
-
-
84957060922
-
Cryptanalysis of the HFE public key cryptosystem
-
Crypto'99
-
A. Kipnis and A. Shamir, Cryptanalysis of the HFE Public Key Cryptosystem, Crypto'99, LNCS 1666, pp. 19-30.
-
LNCS
, vol.1666
, pp. 19-30
-
-
Kipnis, A.1
Shamir, A.2
-
22
-
-
85033537496
-
Public quadratic polynomial-tuples for efficient signature-verification and message-encryption
-
Eurocrypt'88
-
T. Matsumoto and H. Imai, Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption, Eurocrypt'88, LNCS 330, pp. 419-453.
-
LNCS
, vol.330
, pp. 419-453
-
-
Matsumoto, T.1
Imai, H.2
-
23
-
-
0033424342
-
A public key system with signature and master key functions
-
T. Moh, A Public Key System with Signature and Master Key Functions, Communications in Algebra, 27 (1999), pp. 2207-2222.
-
(1999)
Communications in Algebra
, vol.27
, pp. 2207-2222
-
-
Moh, T.1
-
24
-
-
84861256410
-
-
NESSIE project, www.cryptonessie.org.
-
-
-
-
25
-
-
84957640013
-
Cryptanalysis of the matsumoto and imai public key scheme of eurocrypt'88
-
Crypto'95
-
J. Patarin, Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88, Crypto'95, LNCS 963, pp. 248-261.
-
LNCS
, vol.963
, pp. 248-261
-
-
Patarin, J.1
-
26
-
-
84947932132
-
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two new families of Asymmetric algorithms
-
Eurocrypt'96
-
J. Patarin, Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms, Eurocrypt'96, LNCS 1070, pp. 33-48.
-
LNCS
, vol.1070
, pp. 33-48
-
-
Patarin, J.1
-
27
-
-
84937571034
-
FLASH, a fast multivariate signature algorithm
-
CT-RSA'Ol. Update at [24]
-
J. Patarin, N. Courtois, and L. Goubin, FLASH, a Fast Multivariate Signature Algorithm, CT-RSA'Ol, LNCS 2020, pp. 298-307. Update at [24].
-
LNCS
, vol.2020
, pp. 298-307
-
-
Patarin, J.1
Courtois, N.2
Goubin, L.3
-
28
-
-
85115374351
-
Algorithms for quantum computation: Discrete logarithms and factoring
-
IEEE Comp. Soc. Press
-
P. W. Shor, Algorithms for quantum computation: Discrete logarithms and factoring, Proc. 35th Ann. Symp. on Foundations of Comp. Sci., IEEE Comp. Soc. Press (1994), pp. 124-134.
-
(1994)
Proc. 35th Ann. Symp. on Foundations of Comp. Sci.
, pp. 124-134
-
-
Shor, P.W.1
-
30
-
-
26444452822
-
-
mathworld wolfram.com/news/2003-12-05/rsa
-
E. Weisstein, RSA-576 Factored, mathworld.wolfram.com/news/2003-12-05/rsa
-
RSA-576 Factored
-
-
Weisstein, E.1
-
32
-
-
23944498699
-
Efficient cryptanalysis Of RSE(2)PKC and rsse(2)pkc
-
SCN '04
-
C. Wolf, A. Braeken, and B. Preneel, Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC, SCN '04, LNCS 3352, pp. 294-309.
-
LNCS
, vol.3352
, pp. 294-309
-
-
Wolf, C.1
Braeken, A.2
Preneel, B.3
-
34
-
-
24944535234
-
All in the XL family: Theory and practice
-
ICISC'04
-
B.-Y. Yang and J.-M. Chen, All in the XL Family: Theory and Practice, ICISC'04, LNCS 3506, pp. 67-86.
-
LNCS
, vol.3506
, pp. 67-86
-
-
Yang, B.-Y.1
Chen, J.-M.2
-
35
-
-
35048900285
-
TTS: High-speed signatures from low-end smartcards
-
CHES '04
-
B.-Y. Yang, J.-M. Chen, and Y.-H. Chen, TTS: High-Speed Signatures from Low-End Smartcards, CHES '04, LNCS 3156, pp. 371-385.
-
LNCS
, vol.3156
, pp. 371-385
-
-
Yang, B.-Y.1
Chen, J.-M.2
Chen, Y.-H.3
|