-
1
-
-
70549108157
-
-
Springer, Heidelberg
-
Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.): Post-Quantum Cryptography. Springer, Heidelberg (2009)
-
(2009)
Post-Quantum Cryptography
-
-
Bernstein, D.J.1
Buchmann, J.2
Dahmen, E.3
-
2
-
-
78049343086
-
Hybrid approach for solving multivariate systems over finite fields
-
Bettale, L., Faugére, J.-C., Perret, L.: Hybrid approach for solving multivariate systems over finite fields. Journal of Mathematical Cryptology 3, 177-197 (2009)
-
(2009)
Journal of Mathematical Cryptology
, vol.3
, pp. 177-197
-
-
Bettale, L.1
Faugére, J.-C.2
Perret, L.3
-
3
-
-
51049092298
-
Time-area optimized publickey engines: MQ-cryptosystems as replacement for elliptic curves?
-
Oswald, E., Rohatgi, P. (eds.) CHES 2008. Springer, Heidelberg
-
Bogdanov, A., Eisenbarth, T., Rupp, A., Wolf, C.: Time-area optimized publickey engines: MQ-cryptosystems as replacement for elliptic curves? In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 45-61. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5154
, pp. 45-61
-
-
Bogdanov, A.1
Eisenbarth, T.2
Rupp, A.3
Wolf, C.4
-
4
-
-
56749154302
-
Practical-sized instances of multivariate pKCs: Rainbow, TTS, and ℓIC-derivatives
-
Buchmann, J., Ding, J. (eds.) PQCrypto 2008. Springer, Heidelberg
-
Chen, A.I.-T., Chen, C.-H.O., Chen, M.-S., Cheng, C.-M., Yang, B.-Y.: Practical-sized instances of multivariate pKCs: Rainbow, TTS, and ℓIC-derivatives. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 95-108. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5299
, pp. 95-108
-
-
Chen, A.I.-T.1
Chen, C.-H.O.2
Chen, M.-S.3
Cheng, C.-M.4
Yang, B.-Y.5
-
5
-
-
70350604666
-
SSE implementation of multivariate pKCs on modern x86 cPUs
-
Clavier, C., Gaj, K. (eds.) CHES 2009. Springer, Heidelberg
-
Chen, A.I.-T., Chen, M.-S., Chen, T.-R., Cheng, C.-M., Ding, J., Kuo, E.L.-H., Lee, F.Y.-S., Yang, B.-Y.: SSE implementation of multivariate pKCs on modern x86 cPUs. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 33-48. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5747
, pp. 33-48
-
-
Chen, A.I.-T.1
Chen, M.-S.2
Chen, T.-R.3
Cheng, C.-M.4
Ding, J.5
Kuo, E.L.-H.6
Lee, F.Y.-S.7
Yang, B.-Y.8
-
6
-
-
38149076315
-
-
Cambridge University Press, Cambridge
-
Ding, J., Gower, J.E., Schmidt, D.: Multivariate Public Key Cryptography. Cambridge University Press, Cambridge (2006)
-
(2006)
Multivariate Public Key Cryptography
-
-
Ding, J.1
Gower, J.E.2
Schmidt, D.3
-
7
-
-
0036045901
-
A new efficient algorithm for computing Gröbner bases without reduction to zero (F5)
-
ACM Press, New York
-
Faugére, J.-C.: A new efficient algorithm for computing Gröbner bases without reduction to zero (F5). In: ISSAC 2002, pp. 75-83. ACM Press, New York (2002)
-
(2002)
ISSAC 2002
, pp. 75-83
-
-
Faugére, J.-C.1
-
9
-
-
33744804275
-
Similar keys of multivariate quadratic public key cryptosystems
-
Cryptology and Network Security - 4th International Conference, CANS 2005, Proceedings
-
Hu, Y., Wang, L., Chou, C., Lai, F.: Similar keys of multivariate quadratic public key cryptosystems. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 211-222. Springer, Heidelberg (2005) (Pubitemid 43829605)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3810 LNCS
, pp. 211-222
-
-
Hu, Y.-H.1
Wang, L.-C.2
Chou, C.-Y.3
Lai, F.4
-
10
-
-
84957693117
-
Unbalanced oil and vinegar signature schemes
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Kipnis, A., Patarin, J., Goubin, L.: Unbalanced oil and vinegar signature schemes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 206-222. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 206-222
-
-
Kipnis, A.1
Patarin, J.2
Goubin, L.3
-
11
-
-
84957613067
-
Cryptanalysis of the Oil & Vinegar Signature Scheme
-
Advances in Cryptology - CRYPTO '98
-
Kipnis, A., Shamir, A.: Cryptanalysis of the oil & vinegar signature scheme. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 257-266. Springer, Heidelberg (1998) (Pubitemid 128119010)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1462
, pp. 257-266
-
-
Kipnis, A.1
Shamir, A.2
-
13
-
-
78651102117
-
A multivariate signature scheme with a partially cyclic public key
-
Petzoldt, A., Bulygin, S., Buchmann, J.: A multivariate signature scheme with a partially cyclic public key. In: SCC 2010, pp. 229-235 (2010)
-
(2010)
SCC 2010
, pp. 229-235
-
-
Petzoldt, A.1
Bulygin, S.2
Buchmann, J.3
-
14
-
-
79952493422
-
Linear recurring sequences for the UOV key generation
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
-
Petzoldt, A., Bulygin, S., Buchmann, J.: Linear recurring sequences for the UOV key generation. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 335-350. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6571
, pp. 335-350
-
-
Petzoldt, A.1
Bulygin, S.2
Buchmann, J.3
-
15
-
-
80053521476
-
-
Petzoldt, A., Thomae, E., Bulygin, S., Wolf, C.: Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems (full version), http://eprint.iacr.org/2011/294
-
Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems (Full Version)
-
-
Petzoldt, A.1
Thomae, E.2
Bulygin, S.3
Wolf, C.4
-
16
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing 26(5), 1484-1509 (1997)
-
(1997)
SIAM Journal on Computing
, vol.26
, Issue.5
, pp. 1484-1509
-
-
Shor, P.W.1
-
17
-
-
0001263144
-
On an extremal problem in Graph Theory
-
Turán, P.: On an extremal problem in Graph Theory. Matematiko Fizicki Lapok 48, 436-452 (1941)
-
(1941)
Matematiko Fizicki Lapok
, vol.48
, pp. 436-452
-
-
Turán, P.1
-
19
-
-
24144456530
-
Large superfluous keys in multivariate quadratic asymmetric systems
-
Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
-
Wolf, C., Preneel, B.: Superfluous keys in Multivariate Quadratic asymmetric systems. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 275-287. Springer, Heidelberg (2005) (Pubitemid 41231337)
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 275-287
-
-
Wolf, C.1
Preneel, B.2
-
20
-
-
80053469069
-
Equivalent keys in multivariate quadratic public key systems
-
to appear
-
Wolf, C., Preneel, B.: Equivalent keys in multivariate quadratic public key systems. Journal of Mathematical Cryptology (to appear, 2011)
-
(2011)
Journal of Mathematical Cryptology
-
-
Wolf, C.1
Preneel, B.2
-
21
-
-
35048900285
-
TTS: High-speed signatures on a low-cost smart card
-
Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
-
Yang, B.-Y., Chen, J.-M., Chen, Y.-H.: TTS: High-speed signatures on a low-cost smart card. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 371-385. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3156
, pp. 371-385
-
-
Yang, B.-Y.1
Chen, J.-M.2
Chen, Y.-H.3
|