-
1
-
-
84957060922
-
Cryptanalysis of the HFE public key cryptosyatem
-
LNCS 1666, Springer-Verlag
-
A.Kipnis and A.Shamir. Cryptanalysis of the HFE Public Key Cryptosyatem. In Crypto'99, LNCS 1666, pages 19-30. Springer-Verlag, 1999.
-
(1999)
Crypto'99
, pp. 19-30
-
-
Kipnis, A.1
Shamir, A.2
-
3
-
-
85006080539
-
Efficient signature schemes based on birational permutations
-
LNCS 773, Springer-Verlag
-
A.Shamir. Efficient signature schemes based on Birational Permutations. In Crypto'93, LNCS 773, pages 1-12. Springer-Verlag, 1994.
-
(1994)
Crypto'93
, pp. 1-12
-
-
Shamir, A.1
-
4
-
-
40249092492
-
Taxonomy of public key schemes based on the problem of multivariate quadratic equations
-
C.Wolf and B.Preneel. Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations. Cryptology ePrint Archive, Report 2005/077, 2005. http://eprint.iacr.org/.
-
(2005)
Cryptology ePrint Archive, Report
, vol.2005
, Issue.77
-
-
Wolf, C.1
Preneel, B.2
-
5
-
-
84858245440
-
Analysis of a public key approach based on polynomial substitution
-
LNCS 218, Springer-Verlag
-
H.Fell and W.Diffie, Analysis of a Public Key Approach based on Polynomial Substitution. In Crypto'85, LNCS 218, pages 340-349. Springer-Verlag, 1985.
-
(1985)
Crypto'85
, pp. 340-349
-
-
Fell, H.1
Diffie, W.2
-
6
-
-
35248840150
-
Algebraic cryptanalysis of Hidden Field Equation (HFE) cryptosystems using Gröbner bases
-
LNCS 2729, Springer-Verlag
-
J-C.Faugère and A.Joux. Algebraic cryptanalysis of Hidden Field Equation (HFE) cryptosystems using Gröbner Bases. In Crypto'03, LNCS 2729, pages 44-60. Springer-Verlag, 2003.
-
(2003)
Crypto'03
, pp. 44-60
-
-
Faugère, J.-C.1
Joux, A.2
-
7
-
-
35048862324
-
A new variant of the Matsumoto-Imai cryptosystem through perturbation
-
LNCS 2947, Springer-Verlag
-
J.Ding, A new variant of the Matsumoto-Imai Cryptosystem through Perturbation. In PKC'04, LNCS 2947, pages 305-318. Springer-Verlag, 2004.
-
(2004)
PKC'04
, pp. 305-318
-
-
Ding, J.1
-
8
-
-
24144432125
-
Cryptanalysis of HFEv and internal perturbation of HFE
-
LNCS 3386, Springer-Verlag
-
J.Ding and D.Schmidt. Cryptanalysis of HFEv and Internal Perturbation of HFE. In PKC'05, LNCS 3386, pages 288-301. Springer-Verlag, 2005.
-
(2005)
PKC'05
, pp. 288-301
-
-
Ding, J.1
Schmidt, D.2
-
9
-
-
0002210679
-
The number of subspaces of a vector space
-
W.T.Tutte, editor, Academic Press
-
J.Goldman and G-C.Rota. The number of subspaces of a vector space. In W.T.Tutte, editor, Recent progress in Combinatorics, pages 75-83. Academic Press, 1969.
-
(1969)
Recent Progress in Combinatorics
, pp. 75-83
-
-
Goldman, J.1
Rota, G.-C.2
-
10
-
-
84957640013
-
Cryptanalysis of the Matsumoto and imai public key scheme of euro crypt'88
-
LNCS 963, Springer-Verlag
-
J.Patarin, Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Euro crypt'88, In Crypio'95, LNCS 963, pages 248-261. Springer-Verlag, 1995.
-
(1995)
Crypio'95
, pp. 248-261
-
-
Patarin, J.1
-
11
-
-
84947932132
-
Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): Two families of asymetric algorithms
-
LNCS 1070, Springer-Verlag
-
J.Patarin. Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): two families of asymetric algorithms. In Eurocrypt'96, LNCS 1070, pages 33-46. Springer-Verlag, 1996.
-
(1996)
Eurocrypt'96
, pp. 33-46
-
-
Patarin, J.1
-
15
-
-
84937560136
-
The security of Hidden Field Equations (HFE)
-
LNCS 2020, Springer-Verlag
-
N.Courtois. The security of Hidden Field Equations (HFE). In CT-RSA'01, LNCS 2020, pages 266-281. Springer-Verlag, 2001.
-
(2001)
CT-RSA'01
, pp. 266-281
-
-
Courtois, N.1
-
16
-
-
24944454273
-
Differential cryptanalysis for multivariate schemes
-
LNCS 3386, Springer-Verlag
-
P-A.Fouque, L.Granboulan, and J.Stern. Differential cryptanalysis for Multivariate Schemes.In Eurocrypt'05, LNCS 3386, pages 341-353. Springer-Verlag, 2005.
-
(2005)
Eurocrypt'05
, pp. 341-353
-
-
Fouque, P.-A.1
Granboulan, L.2
Stern, J.3
-
17
-
-
0142051871
-
Polynomial-time algorithms for prime factorzation and discrete logarithms on a quantum computer
-
P.Shor. Polynomial-time algorithms for prime factorzation and discrete logarithms on a quantum computer. SIAM J. Comput., 26(5):1484-1509, 1997.
-
(1997)
SIAM J. Comput.
, vol.26
, Issue.5
, pp. 1484-1509
-
-
Shor, P.1
-
19
-
-
0348021825
-
A class of asymetric cryptosystems based on polynomials over finite rings
-
T.Matsumoto and H.Irnai. A class of asymetric cryptosystems based on Polynomials over Finite Rings. In ISIT'83, pages 131-132, 1983.
-
(1983)
ISIT'83
, pp. 131-132
-
-
Matsumoto, T.1
Irnai, H.2
-
20
-
-
85033537496
-
Public quadratic polynomial-tuples for efficient signature-verification and message encryption
-
LNCS 330, Springer-Verlag
-
T.Matsumoto and H.Imai. Public Quadratic Polynomial-tuples for efficient signature-verification and message encryption. In Eurocrypt'88, LNCS 330, pages 419-453. Springer-Verlag, 1988.
-
(1988)
Eurocrypt'88
, pp. 419-453
-
-
Matsumoto, T.1
Imai, H.2
|