-
1
-
-
3042547883
-
-
Akkar, M.-L., Courtois, N.T., Duteuil, R., Goubin, L.: A fast and secure implementation of SFLASH. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, 2567, pp. 267-278. Springer, Heidelberg (2002)
-
Akkar, M.-L., Courtois, N.T., Duteuil, R., Goubin, L.: A fast and secure implementation of SFLASH. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 267-278. Springer, Heidelberg (2002)
-
-
-
-
2
-
-
56749161948
-
-
Bardet, M., Faugère, J.-C., Salvy, B.: On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations. In: Proceedings of the International Conference on Polynomial System Solving, pp. 71-74, Previously INRIA report RR-5049 (2004)
-
Bardet, M., Faugère, J.-C., Salvy, B.: On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations. In: Proceedings of the International Conference on Polynomial System Solving, pp. 71-74, Previously INRIA report RR-5049 (2004)
-
-
-
-
3
-
-
56749083597
-
-
Bardet, M., Faugère, J.-C., Salvy, B., Yang, B.-Y.: Asymptotic expansion of the degree of regularity for semi-regular systems of equations. In: Gianni, P. (ed.) MEGA 2005 Sardinia (Italy) (2005)
-
Bardet, M., Faugère, J.-C., Salvy, B., Yang, B.-Y.: Asymptotic expansion of the degree of regularity for semi-regular systems of equations. In: Gianni, P. (ed.) MEGA 2005 Sardinia (Italy) (2005)
-
-
-
-
4
-
-
38149142286
-
-
Berbain, C., Billet, O., Gilbert, H.: Efficient implementations of multivariate quadratic systems. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, 4356, pp. 174-187. Springer, Heidelberg (2007)
-
Berbain, C., Billet, O., Gilbert, H.: Efficient implementations of multivariate quadratic systems. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 174-187. Springer, Heidelberg (2007)
-
-
-
-
5
-
-
45449095464
-
Twisted edwards curves
-
Vaudenay, S, ed, AFRICACRYPT 2008, Springer, Heidelberg
-
Bernstein, D.J., Birkner, P., Joye, M., Lange, T., Peters, C.: Twisted edwards curves. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 389-405. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5023
, pp. 389-405
-
-
Bernstein, D.J.1
Birkner, P.2
Joye, M.3
Lange, T.4
Peters, C.5
-
6
-
-
38149061268
-
Faster addition and doubling on elliptic curves
-
Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
-
Bernstein, D.J., Lange, T.: Faster addition and doubling on elliptic curves. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 29-50. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 29-50
-
-
Bernstein, D.J.1
Lange, T.2
-
7
-
-
38349013397
-
-
Bernstein, D.J., Lange, T.: Inverted edwards coordinates. In: Boztaş., S., Lu, H.-F. (eds.) AAECC 2007. LNCS, 4851, pp. 20-27. Springer, Heidelberg (2007)
-
Bernstein, D.J., Lange, T.: Inverted edwards coordinates. In: Boztaş., S., Lu, H.-F. (eds.) AAECC 2007. LNCS, vol. 4851, pp. 20-27. Springer, Heidelberg (2007)
-
-
-
-
8
-
-
33749997777
-
-
Billet, O., Gilbert, H.: Cryptanalysis of rainbow. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 336-347. Springer, Heidelberg (2006)
-
Billet, O., Gilbert, H.: Cryptanalysis of rainbow. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 336-347. Springer, Heidelberg (2006)
-
-
-
-
9
-
-
23944453664
-
The security of the birational permutation signature schemes
-
Coppersmith, D., Stern, J., Vaudenay, S.: The security of the birational permutation signature schemes. Journal of Cryptology 10, 207-221 (1997)
-
(1997)
Journal of Cryptology
, vol.10
, pp. 207-221
-
-
Coppersmith, D.1
Stern, J.2
Vaudenay, S.3
-
10
-
-
56749143104
-
-
11 pages
-
Courtois, N., Goubin, L., Patarin, J.: SFLASH: Primitive specification (second revised version), Submissions. Sflash, 11 pages (2002), https://www.cosic.esat.kuleuven.be/nessie
-
(2002)
SFLASH: Primitive specification (second revised version), Submissions. Sflash
-
-
Courtois, N.1
Goubin, L.2
Patarin, J.3
-
11
-
-
77649327985
-
Efficient algorithms for solving overdefmed systems of multivariate polynomial equations
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Courtois, N.T., Klimov, A., Patarin, J., Shamir, A.: Efficient algorithms for solving overdefmed systems of multivariate polynomial equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS. vol. 1807. pp. 392-407. Springer, Heidelberg (2000), http://www.minrank.org/xlfull.pdf
-
(2000)
LNCS
, vol.1807
, pp. 392-407
-
-
Courtois, N.T.1
Klimov, A.2
Patarin, J.3
Shamir, A.4
-
12
-
-
35048862324
-
-
Ding. J.: A new variant of the Matsumoto-Imai cryptosystem through perturbation. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, 2947, pp. 305-318. Springer, Heidelberg (2004)
-
Ding. J.: A new variant of the Matsumoto-Imai cryptosystem through perturbation. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 305-318. Springer, Heidelberg (2004)
-
-
-
-
13
-
-
33745860673
-
-
Ding, J., Gower, J.: Inoculating multivariate schemes against differential attacks. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, 3958. Springer, Heidelberg (2006), http://eprint.iacr.org/ 2005/255
-
Ding, J., Gower, J.: Inoculating multivariate schemes against differential attacks. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958. Springer, Heidelberg (2006), http://eprint.iacr.org/ 2005/255
-
-
-
-
14
-
-
84882571379
-
Multivariate Public-Key Cryptosystems
-
Springer, Heidelberg
-
Ding, J., Gower, J., Schmidt, D.: Multivariate Public-Key Cryptosystems. In: Advances in Information Security. Springer, Heidelberg (2006)
-
(2006)
Advances in Information Security
-
-
Ding, J.1
Gower, J.2
Schmidt, D.3
-
15
-
-
24144432125
-
-
Ding, J., Schmidt, D.: Cryptanalysis of HFEv and internal perturbation of HFE. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 288-301. Springer, Heidelberg (2005)
-
Ding, J., Schmidt, D.: Cryptanalysis of HFEv and internal perturbation of HFE. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 288-301. Springer, Heidelberg (2005)
-
-
-
-
16
-
-
26444529947
-
-
Ding, J., Schmidt, D.: Rainbow, a new multivariable polynomial signature scheme. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 164-175. Springer, Heidelberg (2005)
-
Ding, J., Schmidt, D.: Rainbow, a new multivariable polynomial signature scheme. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 164-175. Springer, Heidelberg (2005)
-
-
-
-
17
-
-
38049058300
-
-
Ding, J., Wolf, C., Yang, B.-Y.: ℓ-invertible cycles for multivariate quadratic public key cryptography. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, 4450, pp. 266-281. Springer, Heidelberg (2007)
-
Ding, J., Wolf, C., Yang, B.-Y.: ℓ-invertible cycles for multivariate quadratic public key cryptography. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 266-281. Springer, Heidelberg (2007)
-
-
-
-
18
-
-
45749150774
-
-
Ding, J., Yang, B.-Y., Chen, C.-H.O., Chen, M.-S., Cheng, C.-M.: New differential-algebraic attacks and reparametrization of rainbow. In: Bellovin, S.M., Gennaro, R., Keromytis, A., Yung, M. (eds.) ACNS 2008. LNCS, 5037, pp. 242-257. Springer, Heidelberg (2008), http://eprint.iacr.org/2008/108
-
Ding, J., Yang, B.-Y., Chen, C.-H.O., Chen, M.-S., Cheng, C.-M.: New differential-algebraic attacks and reparametrization of rainbow. In: Bellovin, S.M., Gennaro, R., Keromytis, A., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 242-257. Springer, Heidelberg (2008), http://eprint.iacr.org/2008/108
-
-
-
-
19
-
-
56749116185
-
Breaking the symmetry: A way to resist the new differential attack
-
ICALP, Springer, Heidelberg
-
Ding, J., Yang, B.-Y., Dubois, V., Cheng, C.-M., Chen, O.C.-H.: Breaking the symmetry: a way to resist the new differential attack. In: ICALP 2008. LNCS. Springer, Heidelberg (2008), http://eprint.iacr.org/2007/366
-
(2008)
LNCS
-
-
Ding, J.1
Yang, B.-Y.2
Dubois, V.3
Cheng, C.-M.4
Chen, O.C.-H.5
-
20
-
-
38049140588
-
Practical cryptanalysis of SFLASH
-
Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
-
Dubois, V., Fouque, P.-A., Shamir, A., Stern, J.: Practical cryptanalysis of SFLASH. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 1-12. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 1-12
-
-
Dubois, V.1
Fouque, P.-A.2
Shamir, A.3
Stern, J.4
-
23
-
-
24944454273
-
Differential cryptanalysis for multivariate schemes
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Fouque, P.-A., Granboulan, L., Stern, J.: Differential cryptanalysis for multivariate schemes. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 341-353. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 341-353
-
-
Fouque, P.-A.1
Granboulan, L.2
Stern, J.3
-
24
-
-
40249108381
-
Total break of the ℓIC- signature scheme
-
Föuque, P.-A., Macario-Rat, G., Perret, L., Stern, J.: Total break of the ℓIC- signature scheme. In: Public Key Cryptography, pp. 1-17 (2008)
-
(2008)
Public Key Cryptography
, pp. 1-17
-
-
Föuque, P.-A.1
Macario-Rat, G.2
Perret, L.3
Stern, J.4
-
25
-
-
84937500998
-
Cryptanalysis of the TTM cryptosystem
-
Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
-
Goubin, L., Courtois, N.T.: Cryptanalysis of the TTM cryptosystem. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 44-57. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 44-57
-
-
Goubin, L.1
Courtois, N.T.2
-
26
-
-
84957693117
-
Unbalanced Oil and Vinegar signature schemes
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Kipnis, A., Patarin, J., Goubin, L.: Unbalanced Oil and Vinegar signature schemes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 206-222. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 206-222
-
-
Kipnis, A.1
Patarin, J.2
Goubin, L.3
-
27
-
-
84957613067
-
Cryptanalysis of the oil and vinegar signature scheme
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Kipnis, A., Shamir, A.: Cryptanalysis of the oil and vinegar signature scheme. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 257-266. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 257-266
-
-
Kipnis, A.1
Shamir, A.2
-
28
-
-
85033537496
-
Public quadratic polynomial-tuples for efficient signature verification and message-encryption
-
Günther, C.G, ed, EUROCRYPT 1988, Springer, Heidelberg
-
Matsumoto, T., Imai, H.: Public quadratic polynomial-tuples for efficient signature verification and message-encryption. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 419-545. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.330
, pp. 419-545
-
-
Matsumoto, T.1
Imai, H.2
-
29
-
-
56749112565
-
Remarks on the attack of fouque et al. against the ℓic scheme. Cryptology ePrint Archive
-
Report 2008/208
-
Ogura, N., Uchiyama, S.: Remarks on the attack of fouque et al. against the ℓic scheme. Cryptology ePrint Archive, Report 2008/208 (2008), http://eprint.iacr.org/
-
(2008)
-
-
Ogura, N.1
Uchiyama, S.2
-
30
-
-
23944498699
-
-
Wolf, C., Braeken, A., Preneel, B.: Efficient cryptanalysis of RSE(2)PKC and RSSE(2)PKC. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, 3352, pp. 294-309. Springer, Heidelberg (2005), http://eprint.iacr.org/2004/237
-
Wolf, C., Braeken, A., Preneel, B.: Efficient cryptanalysis of RSE(2)PKC and RSSE(2)PKC. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 294-309. Springer, Heidelberg (2005), http://eprint.iacr.org/2004/237
-
-
-
-
31
-
-
56749130868
-
-
Wolf, C., Preneel, B.: Taxonomy of public key schemes based on the problem of multivariate quadratic equations. Cryptology ePrint Archive, Report 2005/077, 64 pages, May 12 (2005), http://eprint.iacr.org/2005/077/
-
Wolf, C., Preneel, B.: Taxonomy of public key schemes based on the problem of multivariate quadratic equations. Cryptology ePrint Archive, Report 2005/077, 64 pages, May 12 (2005), http://eprint.iacr.org/2005/077/
-
-
-
-
32
-
-
24944535234
-
-
Yang, B.-Y., Chen, J.-M.: All in the XL family: Theory and practice. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, 3506, pp. 67-86. Springer, Heidelberg (2005)
-
Yang, B.-Y., Chen, J.-M.: All in the XL family: Theory and practice. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 67-86. Springer, Heidelberg (2005)
-
-
-
-
33
-
-
26444593242
-
-
Yang, B.-Y., Chen, J.-M.: Building secure tame-like multivariate public-key cryptosystems: The new TTS. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, 3574, pp. 518-531. Springer, Heidelberg (2005)
-
Yang, B.-Y., Chen, J.-M.: Building secure tame-like multivariate public-key cryptosystems: The new TTS. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 518-531. Springer, Heidelberg (2005)
-
-
-
-
34
-
-
35048900285
-
-
Yang, B.-Y., Chen, J.-M., Chen, Y.-H.: TTS: High-speed signatures on a low-cost smart card. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 371-385. Springer, Heidelberg (2004)
-
Yang, B.-Y., Chen, J.-M., Chen, Y.-H.: TTS: High-speed signatures on a low-cost smart card. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 371-385. Springer, Heidelberg (2004)
-
-
-
|