메뉴 건너뛰기




Volumn 5154 LNCS, Issue , 2008, Pages 45-61

Time-area optimized public-key engines: MQ-cryptosystems as replacement for elliptic curves?

Author keywords

Amended TTS; ECC; Hardware implementation; MQ cryptosystems; Rainbow; TA product; UOV

Indexed keywords

CARBON FIBER REINFORCED PLASTICS; COMPUTER CRIME; COMPUTER NETWORKS; COMPUTER PROGRAMMING LANGUAGES; CRYPTOGRAPHY; CURVE FITTING; FIELD PROGRAMMABLE GATE ARRAYS (FPGA); INTEGRATED CIRCUITS; PARAMETER ESTIMATION; QUANTUM COMPUTERS;

EID: 51049092298     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85053-3_4     Document Type: Conference Paper
Times cited : (79)

References (17)
  • 1
    • 51049094787 scopus 로고    scopus 로고
    • Ansari, B., Anwar Hasan, M.: High performance architecture of elliptic curve scalar multiplication. Technical report, CACR (January 2006)
    • Ansari, B., Anwar Hasan, M.: High performance architecture of elliptic curve scalar multiplication. Technical report, CACR (January 2006)
  • 2
    • 51049101172 scopus 로고    scopus 로고
    • Fast multivariate signature generation in hardware: The case of Rainbow
    • to appear
    • Balasubramanian, S., Bogdanov, A., Rupp, A., Ding, J., Carter, H.W.: Fast multivariate signature generation in hardware: The case of Rainbow. In: ASAP 2008 (to appear, 2008)
    • (2008) ASAP
    • Balasubramanian, S.1    Bogdanov, A.2    Rupp, A.3    Ding, J.4    Carter, H.W.5
  • 3
    • 33749997777 scopus 로고    scopus 로고
    • Billet, O., Gilbert, H.: Cryptanalysis of rainbow. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 336-347. Springer, Heidelberg (2006)
    • Billet, O., Gilbert, H.: Cryptanalysis of rainbow. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 336-347. Springer, Heidelberg (2006)
  • 4
    • 34547403278 scopus 로고    scopus 로고
    • A parallel hardware architecture for fast gaussian elimination over GF
    • Bogdanov, A., Mertens, M., Paar, C., Pelzl, J., Rupp, A.: A parallel hardware architecture for fast gaussian elimination over GF(2). In: FCCM 2006 (2006)
    • (2006) FCCM
    • Bogdanov, A.1    Mertens, M.2    Paar, C.3    Pelzl, J.4    Rupp, A.5
  • 5
    • 33846260842 scopus 로고    scopus 로고
    • High-speed hardware implementations of elliptic curve cryptography: A survey
    • de Dormale, G.M., Quisquater, J.-J.: High-speed hardware implementations of elliptic curve cryptography: A survey. Journal of Systems Architecture 53, 72-84 (2007)
    • (2007) Journal of Systems Architecture , vol.53 , pp. 72-84
    • de Dormale, G.M.1    Quisquater, J.-J.2
  • 6
    • 51049083713 scopus 로고    scopus 로고
    • Note on design criteria for rainbow-type multivariates. Cryptology ePrint Archive
    • Report 2006/307
    • Ding, J., Hu, L., Yang, B.-Y., Chen, J.-M.: Note on design criteria for rainbow-type multivariates. Cryptology ePrint Archive, Report 2006/307 (2006)
    • (2006)
    • Ding, J.1    Hu, L.2    Yang, B.-Y.3    Chen, J.-M.4
  • 7
    • 26444529947 scopus 로고    scopus 로고
    • Ding, J., Schmidt, D.: Rainbow, a new multivariable polynomial signature scheme. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 164-175. Springer, Heidelberg (2005)
    • Ding, J., Schmidt, D.: Rainbow, a new multivariable polynomial signature scheme. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 164-175. Springer, Heidelberg (2005)
  • 8
    • 38049058300 scopus 로고    scopus 로고
    • Ding, J., Wolf, C., Yang, B.-Y.: ℓ-invertible cycles for multivariate quadratic public key cryptography. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, 4450, pp. 266-281. Springer, Heidelberg (2007)
    • Ding, J., Wolf, C., Yang, B.-Y.: ℓ-invertible cycles for multivariate quadratic public key cryptography. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 266-281. Springer, Heidelberg (2007)
  • 9
    • 0024733862 scopus 로고
    • Systolic Gaussian Elimination over GF (p) with Partial Pivoting
    • Hochet, B., Quinton, P., Robert, Y.: Systolic Gaussian Elimination over GF (p) with Partial Pivoting. IEEE Transactions on Computers 38(9), 1321-1324 (1989)
    • (1989) IEEE Transactions on Computers , vol.38 , Issue.9 , pp. 1321-1324
    • Hochet, B.1    Quinton, P.2    Robert, Y.3
  • 10
    • 84957693117 scopus 로고    scopus 로고
    • Unbalanced Oil and Vinegar signature schemes
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Kipnis, A., Patarin, J., Goubin, L.: Unbalanced Oil and Vinegar signature schemes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592
    • Kipnis, A.1    Patarin, J.2    Goubin, L.3
  • 11
    • 51049109322 scopus 로고    scopus 로고
    • Kipnis, A., Patarin, J., Goubin, L.: Unbalanced Oil and Vinegar signature schemes - extended version, 17 pages , 2003-06-11 (2003), http://www.citeseer/ 231623.html
    • Kipnis, A., Patarin, J., Goubin, L.: Unbalanced Oil and Vinegar signature schemes - extended version, 17 pages , 2003-06-11 (2003), http://www.citeseer/ 231623.html
  • 12
    • 51049107816 scopus 로고    scopus 로고
    • Shu, C., Gaj, K., El-Ghazawi, T.: Low latency elliptic curve cryptography accelerators for nist curves on binary fields. In: IEEE FPT 2005 (2005)
    • Shu, C., Gaj, K., El-Ghazawi, T.: Low latency elliptic curve cryptography accelerators for nist curves on binary fields. In: IEEE FPT 2005 (2005)
  • 13
    • 0027663290 scopus 로고    scopus 로고
    • m). IEEE Trans. Comp. 42(9), 1141-1146 (1993)
    • m). IEEE Trans. Comp. 42(9), 1141-1146 (1993)
  • 14
    • 40249092492 scopus 로고    scopus 로고
    • Taxonomy of public key schemes based on the problem of multivariate quadratic equations. Cryptology ePrint Archive
    • Report 2005/077 May 12
    • Wolf, C., Preneel, B.: Taxonomy of public key schemes based on the problem of multivariate quadratic equations. Cryptology ePrint Archive, Report 2005/077 (May 12, 2005)
    • (2005)
    • Wolf, C.1    Preneel, B.2
  • 15
    • 51049083275 scopus 로고    scopus 로고
    • Yang, B.-Y., Chen, J.-M.: Rank attacks and defence in Tame-like multivariate PKC's. Cryptology ePrint Archive Report 2004/061 (September 29, 2004), http://eprint.iacr.org
    • Yang, B.-Y., Chen, J.-M.: Rank attacks and defence in Tame-like multivariate PKC's. Cryptology ePrint Archive Report 2004/061 (September 29, 2004), http://eprint.iacr.org
  • 16
    • 26444593242 scopus 로고    scopus 로고
    • Yang, B.-Y., Chen, J.-M.: Building secure tame-like multivariate public-key cryptosystems: The new TTS. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, 3574, pp. 518-531. Springer, Heidelberg (2005)
    • Yang, B.-Y., Chen, J.-M.: Building secure tame-like multivariate public-key cryptosystems: The new TTS. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 518-531. Springer, Heidelberg (2005)
  • 17
    • 33745816647 scopus 로고    scopus 로고
    • Yang, B.-Y., Cheng, D.C.-M., Chen, B.-R., Chen, J.-M.: Implementing minimized multivariate public-key cryptosystems on low-resource embedded systems. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, 3934, pp. 73-88. Springer, Heidelberg (2006)
    • Yang, B.-Y., Cheng, D.C.-M., Chen, B.-R., Chen, J.-M.: Implementing minimized multivariate public-key cryptosystems on low-resource embedded systems. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 73-88. Springer, Heidelberg (2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.