메뉴 건너뛰기




Volumn 4176 LNCS, Issue , 2006, Pages 161-170

Cryptanalysis of variants of UOV

Author keywords

Digital signature; Multivariate quadratic; UOV; XL

Indexed keywords

ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; MULTIVARIABLE SYSTEMS; QUADRATIC PROGRAMMING; SECURITY OF DATA;

EID: 33750240825     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11836810_12     Document Type: Conference Paper
Times cited : (3)

References (16)
  • 1
    • 35048863447 scopus 로고    scopus 로고
    • Comparison between XL and gröbner basis algorithms
    • Advances in Cryptology -ASIACRYPT 2004, Springer-Verlag
    • Gwénolé Ars, Jean-Charles Faugère, Hideki Imai, Mitsuru Kawazoe, and Makoto Sugita, Comparison Between XL and Gröbner Basis Algorithms, Advances in Cryptology -ASIACRYPT 2004, Lecture Notes in Computer Science 3329, Springer-Verlag (2004) pp. 338-353.
    • (2004) Lecture Notes in Computer Science , vol.3329 , pp. 338-353
    • Ars, G.1    Faugère, J.-C.2    Imai, H.3    Kawazoe, M.4    Sugita, M.5
  • 2
    • 24144434889 scopus 로고    scopus 로고
    • A study of the security of unbalanced oil and vinegar signature schemes
    • The Cryptographers' Track at the RSA Conference 2005, Springer-Verlag extended version
    • An Braeken, Christopher Wolf and Bart Preneel, A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes, The Cryptographers' Track at the RSA Conference 2005, Lecture Notes in Computer Science 3376, Springer-Verlag (2005) pp. 29-43, extended version: http://eprint.iacr.org/2004/222/.
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 29-43
    • Braeken, A.1    Wolf, C.2    Preneel, B.3
  • 3
    • 35248824029 scopus 로고    scopus 로고
    • On the security of HFE, HFEvand quartz
    • Public Key Cryptography -PKC 2003, Springer-Verlag
    • Nicolas Courtois, Magnus Daum, and Patrick Felke, On the security of HFE, HFEvand Quartz, Public Key Cryptography -PKC 2003, Lecture Notes in Computer Science 2567, Springer-Verlag (2002) pp. 337-350.
    • (2002) Lecture Notes in Computer Science , vol.2567 , pp. 337-350
    • Courtois, N.1    Daum, M.2    Felke, P.3
  • 4
    • 77649327985 scopus 로고    scopus 로고
    • Efficient algorithms for solving overdefined systems of multivariate polynomial equations
    • Advances in Cryptology -EUROCRYPT 2000, Springer-Verlag
    • Nicolas Courtois, Alexander Klimov, Jacques Patarin and Adi Shamir, Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations, Advances in Cryptology -EUROCRYPT 2000, Lecture Notes in Computer Science 1807, Springer-Verlag (2000) pp. 392-407.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 392-407
    • Courtois, N.1    Klimov, A.2    Patarin, J.3    Shamir, A.4
  • 5
    • 26444529947 scopus 로고    scopus 로고
    • Rainbow, a new multivariable polynomial signature scheme
    • Applied Cryptography and Network Security -ACNS 2005, Springer-Verlag
    • Jintai Ding and Dieter Schmidt, Rainbow, a New Multivariable Polynomial Signature Scheme, Applied Cryptography and Network Security -ACNS 2005, Lecture Notes in Computer Science 3531, Springer-Verlag (2005) pp. 164-175.
    • (2005) Lecture Notes in Computer Science , vol.3531 , pp. 164-175
    • Ding, J.1    Schmidt, D.2
  • 7
    • 33744804275 scopus 로고    scopus 로고
    • Similar keys of multivariate quadratic public key cryptosystems
    • Cryptology and Network Security -CANS 2005, Springer-Verlag
    • Yuh-Hua Hu, Lih-Chung Wang, Chun-Yen Chou and Feipei Lai, Similar Keys of Multivariate Quadratic Public Key Cryptosystems, Cryptology and Network Security -CANS 2005, Lecture Notes in Computer Science 3810, Springer-Verlag (2005) pp. 244-257.
    • (2005) Lecture Notes in Computer Science , vol.3810 , pp. 244-257
    • Hu, Y.-A.1    Wang, L.-C.2    Chou, C.-Y.3    Lai, F.4
  • 8
    • 84957613067 scopus 로고    scopus 로고
    • Cryptanalysis of the oil & vinegar signature scheme
    • Advances in Cryptology -CRYPTO'98, Springer-Verlag
    • Aviad Kipnis and Adi Shamir, Cryptanalysis of the Oil & Vinegar Signature Scheme, Advances in Cryptology -CRYPTO'98, Lecture Notes in Computer Science 1462, Springer-Verlag (1998) pp. 257-267.
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 257-267
    • Kipnis, A.1    Shamir, A.2
  • 9
    • 84957693117 scopus 로고    scopus 로고
    • Unbalanced oil and vinegar signature schemes
    • Advances in Cryptology - CRYPTO'99, Springer-Verlag
    • Aviad Kipnis, Jacques Patarin and Louis Goubin, Unbalanced Oil and Vinegar Signature Schemes, Advances in Cryptology - CRYPTO'99, Lecture Notes in Computer Science 1592, Springer-Verlag (1999) pp. 206-222.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 206-222
    • Kipnis, A.1    Patarin, J.2    Goubin, L.3
  • 10
    • 33645599274 scopus 로고    scopus 로고
    • The oil and vinegar algorithm for signatures
    • September 97
    • Jacques Patarin, The Oil and Vinegar Algorithm for Signatures, presented at the Dagstuhl Workshop on Cryptography, September 97.
    • Dagstuhl Workshop on Cryptography
    • Patarin, J.1
  • 11
    • 23944498699 scopus 로고    scopus 로고
    • Efficient cryptanalysis of RSE(2)PKC and RSSE(2)PKC
    • Security in Communication Networks, 4th International Conference, SCN 2004, Springer-Verlag extended version
    • Christopher Wolf, An Braeken and Bart Preneel, Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC, Security in Communication Networks, 4th International Conference, SCN 2004, Lecture Notes in Computer Science 3352, Springer-Verlag (2005) pp. 294-309, extended version: http://eprint.iacr.org/2004/237/.
    • (2005) Lecture Notes in Computer Science , vol.3352 , pp. 294-309
    • Wolf, C.1    Braeken, A.2    Preneel, B.3
  • 12
    • 24144456530 scopus 로고    scopus 로고
    • Superfluous keys in Multivariate Quadratic asymmetric systems
    • Public Key Cryptography -PKC 2005, Springer-Verlag extended version
    • Christopher Wolf and Bart Preneel, Superfluous keys in Multivariate Quadratic asymmetric systems, Public Key Cryptography -PKC 2005, Lecture Notes in Computer Science 3386, Springer-Verlag (2005) pp. 275-287, extended version: http://eprint.iacr.org/2004/361/.
    • (2005) Lecture Notes in Computer Science , vol.3386 , pp. 275-287
    • Wolf, C.1    Preneel, B.2
  • 13
    • 24144455333 scopus 로고    scopus 로고
    • Tractable rational map signature
    • Public Key Cryptography - PKC 2005, Springer-Verlag
    • Lih-Chung Wang, Yuh-Hua Hu, Feipei Lai, Chun-Yen Chou and Bo-Yin Yang, Tractable Rational Map Signature, Public Key Cryptography - PKC 2005, Lecture Notes in Computer Science 3386, Springer-Verlag (2005) pp. 244-257.
    • (2005) Lecture Notes in Computer Science , vol.3386 , pp. 244-257
    • Wang, L.-C.1    Hu, Y.-A.2    Lai, F.3    Chou, C.-Y.4    Yang, B.-Y.5
  • 14
    • 33745640504 scopus 로고    scopus 로고
    • A "medium-field" multivariate public-key encryption scheme
    • The Cryptographers' Track at the RSA Conference 2006, Springer-Verlag
    • Lih-Chung Wang, Bo-Yin Yang, Yuh-Hua Hu and Feipei Lai, A "Medium-Field" Multivariate Public-Key Encryption Scheme, The Cryptographers' Track at the RSA Conference 2006, Lecture Notes in Computer Science 3860, Springer-Verlag (2006) pp. 132-149.
    • (2006) Lecture Notes in Computer Science , vol.3860 , pp. 132-149
    • Wang, L.-C.1    Yang, B.-Y.2    Hu, Y.-A.3    Lai, F.4
  • 15
    • 24944535234 scopus 로고    scopus 로고
    • All in the XL family: Theory and practice
    • Information Security and Cryptology -ICISC 2004, Springer-Verlag
    • Bo-Yin Yang and Jiun-Ming Chen, All in the XL Family: Theory and Practice, Information Security and Cryptology -ICISC 2004, Lecture Notes in Computer Science 3506, Springer-Verlag (2004) pp. 67-86.
    • (2004) Lecture Notes in Computer Science , vol.3506 , pp. 67-86
    • Yang, B.-Y.1    Chen, J.-M.2
  • 16
    • 26444593242 scopus 로고    scopus 로고
    • Building secure tame-like multivariate publickey cryptosystems the new TTS
    • Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Springer-Verlag
    • Bo-Yin Yang and Jiun-Ming Chen, Building Secure Tame-like Multivariate PublicKey Cryptosystems The New TTS, Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Lecture Notes in Computer Science 3574, Springer-Verlag (2005) pp. 518-531.
    • (2005) Lecture Notes in Computer Science , vol.3574 , pp. 518-531
    • Yang, B.-Y.1    Chen, J.-M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.