메뉴 건너뛰기




Volumn 4052 LNCS, Issue , 2006, Pages 156-167

An efficient provable distinguisher for HFE

Author keywords

Differential cryptanalysis; HFE; Multivariate cryptography

Indexed keywords

COMBINATORIAL MATHEMATICS; COMPUTATIONAL COMPLEXITY; HEURISTIC METHODS; NONLINEAR EQUATIONS; POLYNOMIALS; QUADRATIC PROGRAMMING;

EID: 33746345894     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11787006_14     Document Type: Conference Paper
Times cited : (17)

References (21)
  • 1
    • 84957060922 scopus 로고    scopus 로고
    • Cryptanalysis of the HFE public key cryptosyatem
    • LNCS 1666, Springer-Verlag
    • A.Kipnis and A.Shamir. Cryptanalysis of the HFE Public Key Cryptosyatem. In Crypto'99, LNCS 1666, pages 19-30. Springer-Verlag, 1999.
    • (1999) Crypto'99 , pp. 19-30
    • Kipnis, A.1    Shamir, A.2
  • 2
    • 0040031337 scopus 로고
    • Bijective methods in the theory of finite vector spaces
    • A.E.Solow A.Nijenhuis and H.S.Wilf. Bijective methods in the theory of finite vector spaces. J. Combin. Theory (A), 37:80-84, 1984.
    • (1984) J. Combin. Theory (A) , vol.37 , pp. 80-84
    • Solow, A.E.1    Nijenhuis, A.2    Wilf, H.S.3
  • 3
    • 85006080539 scopus 로고
    • Efficient signature schemes based on birational permutations
    • LNCS 773, Springer-Verlag
    • A.Shamir. Efficient signature schemes based on Birational Permutations. In Crypto'93, LNCS 773, pages 1-12. Springer-Verlag, 1994.
    • (1994) Crypto'93 , pp. 1-12
    • Shamir, A.1
  • 4
    • 40249092492 scopus 로고    scopus 로고
    • Taxonomy of public key schemes based on the problem of multivariate quadratic equations
    • C.Wolf and B.Preneel. Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations. Cryptology ePrint Archive, Report 2005/077, 2005. http://eprint.iacr.org/.
    • (2005) Cryptology ePrint Archive, Report , vol.2005 , Issue.77
    • Wolf, C.1    Preneel, B.2
  • 5
    • 84858245440 scopus 로고
    • Analysis of a public key approach based on polynomial substitution
    • LNCS 218, Springer-Verlag
    • H.Fell and W.Diffie, Analysis of a Public Key Approach based on Polynomial Substitution. In Crypto'85, LNCS 218, pages 340-349. Springer-Verlag, 1985.
    • (1985) Crypto'85 , pp. 340-349
    • Fell, H.1    Diffie, W.2
  • 6
    • 35248840150 scopus 로고    scopus 로고
    • Algebraic cryptanalysis of Hidden Field Equation (HFE) cryptosystems using Gröbner bases
    • LNCS 2729, Springer-Verlag
    • J-C.Faugère and A.Joux. Algebraic cryptanalysis of Hidden Field Equation (HFE) cryptosystems using Gröbner Bases. In Crypto'03, LNCS 2729, pages 44-60. Springer-Verlag, 2003.
    • (2003) Crypto'03 , pp. 44-60
    • Faugère, J.-C.1    Joux, A.2
  • 7
    • 35048862324 scopus 로고    scopus 로고
    • A new variant of the Matsumoto-Imai cryptosystem through perturbation
    • LNCS 2947, Springer-Verlag
    • J.Ding, A new variant of the Matsumoto-Imai Cryptosystem through Perturbation. In PKC'04, LNCS 2947, pages 305-318. Springer-Verlag, 2004.
    • (2004) PKC'04 , pp. 305-318
    • Ding, J.1
  • 8
    • 24144432125 scopus 로고    scopus 로고
    • Cryptanalysis of HFEv and internal perturbation of HFE
    • LNCS 3386, Springer-Verlag
    • J.Ding and D.Schmidt. Cryptanalysis of HFEv and Internal Perturbation of HFE. In PKC'05, LNCS 3386, pages 288-301. Springer-Verlag, 2005.
    • (2005) PKC'05 , pp. 288-301
    • Ding, J.1    Schmidt, D.2
  • 9
    • 0002210679 scopus 로고
    • The number of subspaces of a vector space
    • W.T.Tutte, editor, Academic Press
    • J.Goldman and G-C.Rota. The number of subspaces of a vector space. In W.T.Tutte, editor, Recent progress in Combinatorics, pages 75-83. Academic Press, 1969.
    • (1969) Recent Progress in Combinatorics , pp. 75-83
    • Goldman, J.1    Rota, G.-C.2
  • 10
    • 84957640013 scopus 로고
    • Cryptanalysis of the Matsumoto and imai public key scheme of euro crypt'88
    • LNCS 963, Springer-Verlag
    • J.Patarin, Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Euro crypt'88, In Crypio'95, LNCS 963, pages 248-261. Springer-Verlag, 1995.
    • (1995) Crypio'95 , pp. 248-261
    • Patarin, J.1
  • 11
    • 84947932132 scopus 로고    scopus 로고
    • Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): Two families of asymetric algorithms
    • LNCS 1070, Springer-Verlag
    • J.Patarin. Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): two families of asymetric algorithms. In Eurocrypt'96, LNCS 1070, pages 33-46. Springer-Verlag, 1996.
    • (1996) Eurocrypt'96 , pp. 33-46
    • Patarin, J.1
  • 15
    • 84937560136 scopus 로고    scopus 로고
    • The security of Hidden Field Equations (HFE)
    • LNCS 2020, Springer-Verlag
    • N.Courtois. The security of Hidden Field Equations (HFE). In CT-RSA'01, LNCS 2020, pages 266-281. Springer-Verlag, 2001.
    • (2001) CT-RSA'01 , pp. 266-281
    • Courtois, N.1
  • 16
    • 24944454273 scopus 로고    scopus 로고
    • Differential cryptanalysis for multivariate schemes
    • LNCS 3386, Springer-Verlag
    • P-A.Fouque, L.Granboulan, and J.Stern. Differential cryptanalysis for Multivariate Schemes.In Eurocrypt'05, LNCS 3386, pages 341-353. Springer-Verlag, 2005.
    • (2005) Eurocrypt'05 , pp. 341-353
    • Fouque, P.-A.1    Granboulan, L.2    Stern, J.3
  • 17
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorzation and discrete logarithms on a quantum computer
    • P.Shor. Polynomial-time algorithms for prime factorzation and discrete logarithms on a quantum computer. SIAM J. Comput., 26(5):1484-1509, 1997.
    • (1997) SIAM J. Comput. , vol.26 , Issue.5 , pp. 1484-1509
    • Shor, P.1
  • 19
    • 0348021825 scopus 로고
    • A class of asymetric cryptosystems based on polynomials over finite rings
    • T.Matsumoto and H.Irnai. A class of asymetric cryptosystems based on Polynomials over Finite Rings. In ISIT'83, pages 131-132, 1983.
    • (1983) ISIT'83 , pp. 131-132
    • Matsumoto, T.1    Irnai, H.2
  • 20
    • 85033537496 scopus 로고
    • Public quadratic polynomial-tuples for efficient signature-verification and message encryption
    • LNCS 330, Springer-Verlag
    • T.Matsumoto and H.Imai. Public Quadratic Polynomial-tuples for efficient signature-verification and message encryption. In Eurocrypt'88, LNCS 330, pages 419-453. Springer-Verlag, 1988.
    • (1988) Eurocrypt'88 , pp. 419-453
    • Matsumoto, T.1    Imai, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.