-
1
-
-
35048863447
-
Comparison between XL and gröbner basis algorithms
-
Advances in Cryptology -ASIACRYPT 2004, Springer-Verlag
-
Gwénolé Ars, Jean-Charles Faugère, Hideki Imai, Mitsuru Kawazoe, and Makoto Sugita, Comparison Between XL and Gröbner Basis Algorithms, Advances in Cryptology -ASIACRYPT 2004, Lecture Notes in Computer Science 3329, Springer-Verlag (2004) pp. 338-353.
-
(2004)
Lecture Notes in Computer Science
, vol.3329
, pp. 338-353
-
-
Ars, G.1
Faugère, J.-C.2
Imai, H.3
Kawazoe, M.4
Sugita, M.5
-
2
-
-
24144434889
-
A study of the security of unbalanced oil and vinegar signature schemes
-
The Cryptographers' Track at the RSA Conference 2005, Springer-Verlag extended version
-
An Braeken, Christopher Wolf and Bart Preneel, A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes, The Cryptographers' Track at the RSA Conference 2005, Lecture Notes in Computer Science 3376, Springer-Verlag (2005) pp. 29-43, extended version: http://eprint.iacr.org/2004/222/.
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 29-43
-
-
Braeken, A.1
Wolf, C.2
Preneel, B.3
-
3
-
-
35248824029
-
On the security of HFE, HFEvand quartz
-
Public Key Cryptography -PKC 2003, Springer-Verlag
-
Nicolas Courtois, Magnus Daum, and Patrick Felke, On the security of HFE, HFEvand Quartz, Public Key Cryptography -PKC 2003, Lecture Notes in Computer Science 2567, Springer-Verlag (2002) pp. 337-350.
-
(2002)
Lecture Notes in Computer Science
, vol.2567
, pp. 337-350
-
-
Courtois, N.1
Daum, M.2
Felke, P.3
-
4
-
-
77649327985
-
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
-
Advances in Cryptology -EUROCRYPT 2000, Springer-Verlag
-
Nicolas Courtois, Alexander Klimov, Jacques Patarin and Adi Shamir, Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations, Advances in Cryptology -EUROCRYPT 2000, Lecture Notes in Computer Science 1807, Springer-Verlag (2000) pp. 392-407.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 392-407
-
-
Courtois, N.1
Klimov, A.2
Patarin, J.3
Shamir, A.4
-
5
-
-
26444529947
-
Rainbow, a new multivariable polynomial signature scheme
-
Applied Cryptography and Network Security -ACNS 2005, Springer-Verlag
-
Jintai Ding and Dieter Schmidt, Rainbow, a New Multivariable Polynomial Signature Scheme, Applied Cryptography and Network Security -ACNS 2005, Lecture Notes in Computer Science 3531, Springer-Verlag (2005) pp. 164-175.
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 164-175
-
-
Ding, J.1
Schmidt, D.2
-
7
-
-
33744804275
-
Similar keys of multivariate quadratic public key cryptosystems
-
Cryptology and Network Security -CANS 2005, Springer-Verlag
-
Yuh-Hua Hu, Lih-Chung Wang, Chun-Yen Chou and Feipei Lai, Similar Keys of Multivariate Quadratic Public Key Cryptosystems, Cryptology and Network Security -CANS 2005, Lecture Notes in Computer Science 3810, Springer-Verlag (2005) pp. 244-257.
-
(2005)
Lecture Notes in Computer Science
, vol.3810
, pp. 244-257
-
-
Hu, Y.-A.1
Wang, L.-C.2
Chou, C.-Y.3
Lai, F.4
-
8
-
-
84957613067
-
Cryptanalysis of the oil & vinegar signature scheme
-
Advances in Cryptology -CRYPTO'98, Springer-Verlag
-
Aviad Kipnis and Adi Shamir, Cryptanalysis of the Oil & Vinegar Signature Scheme, Advances in Cryptology -CRYPTO'98, Lecture Notes in Computer Science 1462, Springer-Verlag (1998) pp. 257-267.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 257-267
-
-
Kipnis, A.1
Shamir, A.2
-
9
-
-
84957693117
-
Unbalanced oil and vinegar signature schemes
-
Advances in Cryptology - CRYPTO'99, Springer-Verlag
-
Aviad Kipnis, Jacques Patarin and Louis Goubin, Unbalanced Oil and Vinegar Signature Schemes, Advances in Cryptology - CRYPTO'99, Lecture Notes in Computer Science 1592, Springer-Verlag (1999) pp. 206-222.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 206-222
-
-
Kipnis, A.1
Patarin, J.2
Goubin, L.3
-
10
-
-
33645599274
-
The oil and vinegar algorithm for signatures
-
September 97
-
Jacques Patarin, The Oil and Vinegar Algorithm for Signatures, presented at the Dagstuhl Workshop on Cryptography, September 97.
-
Dagstuhl Workshop on Cryptography
-
-
Patarin, J.1
-
11
-
-
23944498699
-
Efficient cryptanalysis of RSE(2)PKC and RSSE(2)PKC
-
Security in Communication Networks, 4th International Conference, SCN 2004, Springer-Verlag extended version
-
Christopher Wolf, An Braeken and Bart Preneel, Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC, Security in Communication Networks, 4th International Conference, SCN 2004, Lecture Notes in Computer Science 3352, Springer-Verlag (2005) pp. 294-309, extended version: http://eprint.iacr.org/2004/237/.
-
(2005)
Lecture Notes in Computer Science
, vol.3352
, pp. 294-309
-
-
Wolf, C.1
Braeken, A.2
Preneel, B.3
-
12
-
-
24144456530
-
Superfluous keys in Multivariate Quadratic asymmetric systems
-
Public Key Cryptography -PKC 2005, Springer-Verlag extended version
-
Christopher Wolf and Bart Preneel, Superfluous keys in Multivariate Quadratic asymmetric systems, Public Key Cryptography -PKC 2005, Lecture Notes in Computer Science 3386, Springer-Verlag (2005) pp. 275-287, extended version: http://eprint.iacr.org/2004/361/.
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 275-287
-
-
Wolf, C.1
Preneel, B.2
-
13
-
-
24144455333
-
Tractable rational map signature
-
Public Key Cryptography - PKC 2005, Springer-Verlag
-
Lih-Chung Wang, Yuh-Hua Hu, Feipei Lai, Chun-Yen Chou and Bo-Yin Yang, Tractable Rational Map Signature, Public Key Cryptography - PKC 2005, Lecture Notes in Computer Science 3386, Springer-Verlag (2005) pp. 244-257.
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 244-257
-
-
Wang, L.-C.1
Hu, Y.-A.2
Lai, F.3
Chou, C.-Y.4
Yang, B.-Y.5
-
14
-
-
33745640504
-
A "medium-field" multivariate public-key encryption scheme
-
The Cryptographers' Track at the RSA Conference 2006, Springer-Verlag
-
Lih-Chung Wang, Bo-Yin Yang, Yuh-Hua Hu and Feipei Lai, A "Medium-Field" Multivariate Public-Key Encryption Scheme, The Cryptographers' Track at the RSA Conference 2006, Lecture Notes in Computer Science 3860, Springer-Verlag (2006) pp. 132-149.
-
(2006)
Lecture Notes in Computer Science
, vol.3860
, pp. 132-149
-
-
Wang, L.-C.1
Yang, B.-Y.2
Hu, Y.-A.3
Lai, F.4
-
15
-
-
24944535234
-
All in the XL family: Theory and practice
-
Information Security and Cryptology -ICISC 2004, Springer-Verlag
-
Bo-Yin Yang and Jiun-Ming Chen, All in the XL Family: Theory and Practice, Information Security and Cryptology -ICISC 2004, Lecture Notes in Computer Science 3506, Springer-Verlag (2004) pp. 67-86.
-
(2004)
Lecture Notes in Computer Science
, vol.3506
, pp. 67-86
-
-
Yang, B.-Y.1
Chen, J.-M.2
-
16
-
-
26444593242
-
Building secure tame-like multivariate publickey cryptosystems the new TTS
-
Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Springer-Verlag
-
Bo-Yin Yang and Jiun-Ming Chen, Building Secure Tame-like Multivariate PublicKey Cryptosystems The New TTS, Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Lecture Notes in Computer Science 3574, Springer-Verlag (2005) pp. 518-531.
-
(2005)
Lecture Notes in Computer Science
, vol.3574
, pp. 518-531
-
-
Yang, B.-Y.1
Chen, J.-M.2
|