-
1
-
-
71549150097
-
-
Bard, G.V.: Accelerating cryptanalysis with the Method of Four Russians. Report 251, Cryptology ePrint Archive (2006)
-
Bard, G.V.: Accelerating cryptanalysis with the Method of Four Russians. Report 251, Cryptology ePrint Archive (2006)
-
-
-
-
2
-
-
24144434889
-
-
Braeken, A., Wolf, C., Preneel, B.: A study of the security of Unbalanced Oil and Vinegar signature schemes. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, 3376, pp. 29-43. Springer, Heidelberg (2005)
-
Braeken, A., Wolf, C., Preneel, B.: A study of the security of Unbalanced Oil and Vinegar signature schemes. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 29-43. Springer, Heidelberg (2005)
-
-
-
-
3
-
-
77649327985
-
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Courtois, N., Klimov, A., Patarin, J., Shamir, A.: Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 392-407. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 392-407
-
-
Courtois, N.1
Klimov, A.2
Patarin, J.3
Shamir, A.4
-
4
-
-
71549147935
-
-
Ding, J., Buchmann, J., Mohamed, M.S.E., Moahmed, W.S.A., Weinmann, R.-P.: MutantXL. In: Proceedings of the 1st international conference on Symbolic Computation and Cryptography (SCC 2008), Beijing, China, pp. 16-22. LMIB (April 2008)
-
Ding, J., Buchmann, J., Mohamed, M.S.E., Moahmed, W.S.A., Weinmann, R.-P.: MutantXL. In: Proceedings of the 1st international conference on Symbolic Computation and Cryptography (SCC 2008), Beijing, China, pp. 16-22. LMIB (April 2008)
-
-
-
-
5
-
-
71549170322
-
-
Ding, J., Gower, J.E., Schmidt, D.S.: Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field. Technical Report 038, Cryptology ePrint Archive (2006)
-
Ding, J., Gower, J.E., Schmidt, D.S.: Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field. Technical Report 038, Cryptology ePrint Archive (2006)
-
-
-
-
6
-
-
0033143274
-
A new efficient algorithm for computing Gröbner bases (F4)
-
Faugère, J.-C.: A new efficient algorithm for computing Gröbner bases (F4). Journal of Pure and Applied Algebra 139(1-3), 61-88 (1999)
-
(1999)
Journal of Pure and Applied Algebra
, vol.139
, Issue.1-3
, pp. 61-88
-
-
Faugère, J.-C.1
-
7
-
-
35248840150
-
Algebraic Cryptoanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases
-
Springer, Heidelberg
-
Faugère, J.-C., Joux, A.: Algebraic Cryptoanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases. In: Proceedings of the International Association for Cryptologic Research 2003, pp. 44-60. Springer, Heidelberg (2003)
-
(2003)
Proceedings of the International Association for Cryptologic Research
, pp. 44-60
-
-
Faugère, J.-C.1
Joux, A.2
-
8
-
-
71549127549
-
Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations
-
Report 352, Cryptology ePrint Archive
-
Gligoroski, D.: Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations. Report 352, Cryptology ePrint Archive (2005)
-
(2005)
-
-
Gligoroski, D.1
-
9
-
-
78650603590
-
Multivariate Quadratic Trapdoor Functions Based on Multivariate Quadratic Quasigroups
-
Cambridge, Massachusetts, USA March
-
Gligoroski, D., Markovski, S., Knapskog, S.J.: Multivariate Quadratic Trapdoor Functions Based on Multivariate Quadratic Quasigroups. In: Proceedings of The American Conference on Applied Mathematics (MATH 2008), Cambridge, Massachusetts, USA (March 2008)
-
(2008)
Proceedings of The American Conference on Applied Mathematics (MATH
-
-
Gligoroski, D.1
Markovski, S.2
Knapskog, S.J.3
-
10
-
-
71549126024
-
-
Gligoroski, D., Markovski, S., Knapskog, S.J.: Public Key Block Cipher Based on Multivariate Quadratic Quasigroups. Report 320, Cryptology ePrint Archive (2008)
-
Gligoroski, D., Markovski, S., Knapskog, S.J.: Public Key Block Cipher Based on Multivariate Quadratic Quasigroups. Report 320, Cryptology ePrint Archive (2008)
-
-
-
-
11
-
-
84957693117
-
Unbalanced oil and vinegar signature schemes
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Kipnis, A., Hotzvim, H.S.H., Patarin, J., Goubin, L.: Unbalanced oil and vinegar signature schemes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 206-222. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 206-222
-
-
Kipnis, A.1
Hotzvim, H.S.H.2
Patarin, J.3
Goubin, L.4
-
12
-
-
85033537496
-
Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption
-
Günther, C.G, ed, EUROCRYPT 1988, Springer, Heidelberg
-
Matsumoto, T., Imai, H.: Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 419-453. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.330
, pp. 419-453
-
-
Matsumoto, T.1
Imai, H.2
-
13
-
-
56749170583
-
MXL2: Solving Polynomial Equations over GF(2) using an Improved Mutant Strategy
-
Buchmann, J, Ding, J, eds, PQCrypto 2008, Springer, Heidelberg
-
Mohamed, M.S.E., Mohamed, W.S.A.E., Ding, J., Buchmann, J.: MXL2: Solving Polynomial Equations over GF(2) using an Improved Mutant Strategy. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 203-215. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5299
, pp. 203-215
-
-
Mohamed, M.S.E.1
Mohamed, W.S.A.E.2
Ding, J.3
Buchmann, J.4
-
14
-
-
84957640013
-
Cryptanalysis of the Matsumoto and Imai Public Key Scheme
-
Coppersmith, D, ed, CRYPTO 1995, Springer, Heidelberg
-
Patarin, J.: Cryptanalysis of the Matsumoto and Imai Public Key Scheme. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 248-261. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.963
, pp. 248-261
-
-
Patarin, J.1
-
15
-
-
84947932132
-
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two new families of Asymmetric Algorithms
-
Maurer, U.M, ed, EUROCRYPT 1996, Springer, Heidelberg
-
Patarin, J.: Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of Asymmetric Algorithms. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 33-48. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 33-48
-
-
Patarin, J.1
-
16
-
-
24144456530
-
-
Wolf, C., Preneel, B.: Superfluous keys in multivariate quadratic asymmetric systems. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 275-287. Springer, Heidelberg (2005)
-
Wolf, C., Preneel, B.: Superfluous keys in multivariate quadratic asymmetric systems. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 275-287. Springer, Heidelberg (2005)
-
-
-
|