-
1
-
-
3042547883
-
A fast and secure implementation of SPLASH
-
PKC'03
-
M. Akkar, N. Courtois, R. Duteuil, and L. Goubin, A Fast and Secure Implementation of SPLASH, PKC'03, LNCS 2567, pp. 267-278.
-
LNCS
, vol.2567
, pp. 267-278
-
-
Akkar, M.1
Courtois, N.2
Duteuil, R.3
Goubin, L.4
-
2
-
-
24144455333
-
Tractable rational map signature
-
PKC'05
-
C.-Y. Chou, Y.-H. Hu, F.-P. Lai, L.-C. Wang, and B.-Y. Yang, Tractable Rational Map Signature, PKC'05, LNCS 3386, pp. 244-257.
-
LNCS
, vol.3386
, pp. 244-257
-
-
Chou, C.-Y.1
Hu, Y.-H.2
Lai, F.-P.3
Wang, L.-C.4
Yang, B.-Y.5
-
3
-
-
33947128822
-
Generic attacks and the security of quartz
-
PKC'03
-
N. Courtois, Generic Attacks and the Security of Quartz, PKC'03, LNCS 2567, pp. 351-364.
-
LNCS
, vol.2567
, pp. 351-364
-
-
Courtois, N.1
-
4
-
-
84958969583
-
Solving underdefined systems of multivariate quadratic equations
-
PKC'02
-
N. Courtois, L. Goubin, W. Meier, and J. Tacier, Solving Underdefined Systems of Multivariate Quadratic Equations, PKC'02, LNCS 2274, pp. 211-227.
-
LNCS
, vol.2274
, pp. 211-227
-
-
Courtois, N.1
Goubin, L.2
Meier, W.3
Tacier, J.4
-
5
-
-
77649327985
-
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
-
EUROCRYPT 2000
-
N. Courtois, A. Klimov, J. Patarin, and A. Shamir, Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations, EUROCRYPT 2000, LNCS 1807, pp. 392-407.
-
LNCS
, vol.1807
, pp. 392-407
-
-
Courtois, N.1
Klimov, A.2
Patarin, J.3
Shamir, A.4
-
7
-
-
0004175163
-
-
John Wiley & Sons, New York-Chichester-Brisbane
-
P. Davis, Circulant matrices, John Wiley & Sons, New York-Chichester-Brisbane, 1979.
-
(1979)
Circulant Matrices
-
-
Davis, P.1
-
8
-
-
26444539989
-
The XL-algorithm and a conjecture from commutative algebra
-
ASIACRYPT'04
-
C. Diem, The XL-algorithm and a conjecture from commutative algebra, ASIACRYPT'04, LNCS 3329, pp. 338-353.
-
LNCS
, vol.3329
, pp. 338-353
-
-
Diem, C.1
-
9
-
-
35048862324
-
A new variant of the Matsumoto-Imai cryptosystem through perturbation
-
PKC'04
-
J. Ding, A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation, PKC'04, LNCS 2947, pp. 305-318.
-
LNCS
, vol.2947
, pp. 305-318
-
-
Ding, J.1
-
11
-
-
26444529947
-
Rainbow, a new digitial multivariate signature scheme
-
ACNS'05
-
J. Ding and D. Schmidt, Rainbow, a new Digitial Multivariate Signature Scheme, ACNS'05, LNCS 3531, pp. 164-177.
-
LNCS
, vol.3531
, pp. 164-177
-
-
Ding, J.1
Schmidt, D.2
-
12
-
-
26444502248
-
Cryptanalysis of TTS and tame-like multivariable signature schemes
-
J. Ding and Z. Yin, Cryptanalysis of TTS and tame-like multivariable signature schemes, presentation, IWAP'04.
-
IWAP'04
-
-
Ding, J.1
Yin, Z.2
-
13
-
-
0036045901
-
A new efficient algorithm for computing Gröbner bases without reduction to zero (F5)
-
ACM Press
-
J.-C. Faugère, A New Efficient Algorithm for Computing Gröbner Bases without Reduction to Zero (F5), Proceedings of ISSAC'02, pp. 75-83, ACM Press 2002.
-
(2002)
Proceedings of ISSAC'02
, pp. 75-83
-
-
Faugère, J.-C.1
-
14
-
-
84941165630
-
-
invited talk and private communication
-
J.-C. Faugère, invited talk at AES4 conference, and private communication.
-
AES4 Conference
-
-
Faugère, J.-C.1
-
15
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
CHES 2004
-
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, Strong Authentication for RFID Systems Using the AES Algorithm, CHES 2004, LNCS 3156, pp. 357-370.
-
LNCS
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
17
-
-
23944459661
-
Public key cryptography in sensor networks - Revisited
-
1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), Heidelberg, Germany, August
-
G. Gaubatz, J.-P. Kaps, and B. Sunar, Public Key Cryptography in Sensor Networks - Revisited, 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), LNCS 3313, Heidelberg, Germany, August, 2004.
-
(2004)
LNCS
, vol.3313
-
-
Gaubatz, G.1
Kaps, J.-P.2
Sunar, B.3
-
18
-
-
1542316037
-
The nesC language: A holistic approach to networked embedded systems
-
San Diego, CA, USA, June
-
D. Gay, P. Levis, R. von Behren, M. Welsh, E. Brewer, and D. Culler, The nesC Language: A Holistic Approach to Networked Embedded Systems, ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation (PLDI), San Diego, CA, USA, June, 2003.
-
(2003)
ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation (PLDI)
-
-
Gay, D.1
Levis, P.2
Von Behren, R.3
Welsh, M.4
Brewer, E.5
Culler, D.6
-
19
-
-
84947255402
-
Cryptanalysis of SFLASH
-
EUROCRYPT 2002
-
H. Gilbert and M. Minier, Cryptanalysis of SFLASH, EUROCRYPT 2002, LNCS 2332, pp. 288-298.
-
LNCS
, vol.2332
, pp. 288-298
-
-
Gilbert, H.1
Minier, M.2
-
20
-
-
84946835010
-
Attacking the affine parts of SFLASH
-
8th International IMA Conference on Cryptography and Coding
-
W. Geiselmann, R. Steinwandt, and T. Beth, Attacking the Affine Parts of SFLASH, 8th International IMA Conference on Cryptography and Coding, LNCS 2260, pp. 355-359.
-
LNCS
, vol.2260
, pp. 355-359
-
-
Geiselmann, W.1
Steinwandt, R.2
Beth, T.3
-
21
-
-
84937500998
-
Cryptanalysis of the TTM cryptosystem
-
ASIACRYPT 2000
-
L. Goubin and N. Courtois, Cryptanalysis of the TTM Cryptosystem, ASIACRYPT 2000, LNCS 1976, pp. 44-57.
-
LNCS
, vol.1976
, pp. 44-57
-
-
Goubin, L.1
Courtois, N.2
-
23
-
-
0034445661
-
System architecture directions for networked sensors
-
November
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. E. Culler, and K. S. J. Pister, System Architecture Directions for Networked Sensors, Proc. 9th International Conference on Architectural Support for Programming Languages and Operating Systems (November 2000), pp. 93-104.
-
(2000)
Proc. 9th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.E.5
Pister, K.S.J.6
-
24
-
-
33745852822
-
A performance report and security analysis of a fast TTM implementation
-
Yokohama, Japan, June
-
Y. Hu, L. Wang, J. Chen, F. Lai, and C. Chou, A Performance Report and Security Analysis of a fast TTM implementation, 2003 IEEE Int'l Symp. on Information Theory, Yokohama, Japan, June 2003.
-
(2003)
2003 IEEE Int'l Symp. on Information Theory
-
-
Hu, Y.1
Wang, L.2
Chen, J.3
Lai, F.4
Chou, C.5
-
25
-
-
33744804275
-
Similar keys of multivariate quadratic public key cryptosystems
-
CANS'05
-
Y Hu, L. Wang, F. Lai, and C. Chou, Similar Keys of Multivariate Quadratic Public Key Cryptosystems, CANS'05, LNCS 3810, pp. 211-222.
-
LNCS
, vol.3810
, pp. 211-222
-
-
Hu, Y.1
Wang, L.2
Lai, F.3
Chou, C.4
-
26
-
-
24144484756
-
Cryptanalysis of the tractable rational map cryptosystem
-
PKC'05
-
A. Joux, S. Kunz-Jacques, F. Muller, P.-M. Ricordel, Cryptanalysis of the Tractable Rational Map Cryptosystem, PKC'05, LNCS 3386, pp. 258-274.
-
LNCS
, vol.3386
, pp. 258-274
-
-
Joux, A.1
Kunz-Jacques, S.2
Muller, F.3
Ricordel, P.-M.4
-
27
-
-
84957693117
-
Unbalanced oil and vinegar signature schemes
-
CRYPTO'99
-
A. Kipnis, J. Patarin, and L. Goubin, Unbalanced Oil and Vinegar Signature Schemes, CRYPTO'99, LNCS 1592, pp. 206-222.
-
LNCS
, vol.1592
, pp. 206-222
-
-
Kipnis, A.1
Patarin, J.2
Goubin, L.3
-
30
-
-
20344381294
-
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
-
Santa Clara, CA, USA, October
-
D. Malan, M. Welsh, and M. Smith, A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography, First IEEE International Conference on Sensor and Ad hoc Communications and Networks (SECON), Santa Clara, CA, USA, October, 2004.
-
(2004)
First IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON)
-
-
Malan, D.1
Welsh, M.2
Smith, M.3
-
31
-
-
85033537496
-
Public quadratic polynomial-tuples for efficient signature-verification and message-encryption
-
EUROCRYPT'88
-
T. Matsumoto and H. Imai, Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption, EUROCRYPT'88, LNCS 330, pp. 419-453.
-
LNCS
, vol.330
, pp. 419-453
-
-
Matsumoto, T.1
Imai, H.2
-
32
-
-
0031599142
-
Mersenne twister: A 623-dimensionally equidistributed uniform pseudo-random number generator
-
M. Matsumoto and T. Nishimura, Mersenne Twister: A 623-Dimensionally Equidistributed Uniform Pseudo-Random Number Generator, ACM Trans. on Modeling and Computer Sim., 8 (1998), pp. 3-30.
-
(1998)
ACM Trans. on Modeling and Computer Sim.
, vol.8
, pp. 3-30
-
-
Matsumoto, M.1
Nishimura, T.2
-
34
-
-
0029179487
-
Some remarks on efficient inversion in finite fields
-
Whistler, B.C. Canada, September available from the author's website
-
C. Paar, Some Remarks on Efficient Inversion in Finite Fields, 1995 IEEE International Symposium on Information Theory, Whistler, B.C. Canada, September 1995, available from the author's website.
-
(1995)
1995 IEEE International Symposium on Information Theory
-
-
Paar, C.1
-
35
-
-
0000620374
-
A new architecture for a parallel finite field multiplier with low complexity based on composition fields
-
C. Paar, A New Architecture for a Parallel Finite Field Multiplier with Low Complexity Based on Composition Fields, Brief Contributions section of IEEE Transactions on Computers, vol. 45(1996), No. 7, pp. 856-861.
-
(1996)
Brief Contributions Section of IEEE Transactions on Computers
, vol.45
, Issue.7
, pp. 856-861
-
-
Paar, C.1
-
36
-
-
84957640013
-
Cryptanalysis of the Matsurnoto and Imai public key scheme of Eurocrypt '88
-
CRYPTO'95
-
J. Patarin, Cryptanalysis of the Matsurnoto and Imai Public Key Scheme of Eurocrypt '88, CRYPTO'95, LNCS 963, pp. 248-261.
-
LNCS
, vol.963
, pp. 248-261
-
-
Patarin, J.1
-
37
-
-
84947932132
-
Hidden Fields Equations (HFE) and isomorphisms of Polynomials (IP): Two new families of asymmetric algorithms
-
EUROCRYPT'96
-
J. Patarin, Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms, EUROCRYPT'96, LNCS 1070, pp. 33-48.
-
LNCS
, vol.1070
, pp. 33-48
-
-
Patarin, J.1
-
38
-
-
84947768941
-
-+ and HM: Variations around two schemes of T. Matsumoto and H. Imai
-
ASIACRYPT'98
-
-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai, ASIACRYPT'98, LNCS 1514, pp. 35-49.
-
LNCS
, vol.1514
, pp. 35-49
-
-
Patarin, J.1
Goubin, L.2
Courtois, N.3
-
39
-
-
84937571034
-
FLASH, a fast multivariate signature algorithm
-
CT-RSA'01
-
J. Patarin, N. Courtois, and L. Goubin, FLASH, a Fast Multivariate Signature Algorithm, CT-RSA'01, LNCS 2020, pp. 298-307. Updated version available at http://www.cryptonessie.org
-
LNCS
, vol.2020
, pp. 298-307
-
-
Patarin, J.1
Courtois, N.2
Goubin, L.3
-
40
-
-
85115374351
-
Algorithms for quantum computation: Discrete logarithms and factoring
-
(S. Goldwasser, ed.), IEEE Computer Society Press
-
P. W. Shor, Algorithms for quantum computation: Discrete logarithms and factoring, Proc. 35nd Annual Symposium on Foundations of Computer Science (S. Goldwasser, ed.), IEEE Computer Society Press (1994), 124-134.
-
(1994)
Proc. 35nd Annual Symposium on Foundations of Computer Science
, pp. 124-134
-
-
Shor, P.W.1
-
42
-
-
33646202913
-
Equivalent keys in HFE, C*, and variations
-
Mycrypt'05
-
C. Wolf and B. Preneel, Equivalent Keys in HFE, C*, and variations, In Mycrypt'05, LNCS 3715, pp. 33-49, 2005.
-
(2005)
LNCS
, vol.3715
, pp. 33-49
-
-
Wolf, C.1
Preneel, B.2
-
43
-
-
68049088029
-
Rank attacks and defence in tame-like multivariate PKC's
-
ACISP 2005. Older version at E-Print Archive 2004/061
-
B.-Y. Yang and J.-M. Chen, Rank Attacks and Defence in Tame-Like Multivariate PKC's, ACISP 2005, LNCS 3574, p. 518-531. Older version at E-Print Archive 2004/061.
-
LNCS
, vol.3574
, pp. 518-531
-
-
Yang, B.-Y.1
Chen, J.-M.2
-
44
-
-
35048900285
-
TTS: High-speed signatures on a low-cost smart card
-
CHES'04
-
B.-Y. Yang, Y.-H. Chen, and J.-M. Chen, TTS: High-Speed Signatures on a Low-Cost Smart Card, CHES'04, LNCS 3156, pp. 371-385.
-
LNCS
, vol.3156
, pp. 371-385
-
-
Yang, B.-Y.1
Chen, Y.-H.2
Chen, J.-M.3
-
45
-
-
33745818938
-
-
Taiwan Information Security Center (TWISC)
-
B.-Y. Yang, C.-M. Cheng, B.-R. Chen, and J.-M. Chen, Technical Research Report Number 11, 2005, Taiwan Information Security Center (TWISC).
-
(2005)
Technical Research Report Number 11
, vol.11
-
-
Yang, B.-Y.1
Cheng, C.-M.2
Chen, B.-R.3
Chen, J.-M.4
|