메뉴 건너뛰기




Volumn 1976, Issue , 2000, Pages 44-57

Cryptanalysis of the TTM cryptosystem

Author keywords

[No Author keywords available]

Indexed keywords

INVERSE PROBLEMS; LINEAR ALGEBRA; MOBILE SECURITY; SECURITY OF DATA; TRUCK TRAILERS;

EID: 84937500998     PISSN: 03029743     EISSN: 16113349     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (127)

References (23)
  • 2
    • 84937429155 scopus 로고
    • Asymptotic analysis of probabilistic algorithms for finding short codewords
    • Udine, Italy, CISM Courses and lectures no 339, Springer-Verlag
    • F. Chabaud, Asymptotic analysis of probabilistic algorithms for finding short codewords, in Proceedings of Eurocode’92, Udine, Italy, CISM Courses and lectures no 339, Springer-Verlag, 1993, pp. 217-228.
    • (1993) Proceedings of Eurocode , vol.92 , pp. 217-228
    • Chabaud, F.1
  • 5
    • 85023205150 scopus 로고
    • Matrixm ultiplication via arithmetic progressions
    • D. Coppersmith, S. Winograd, Matrixm ultiplication via arithmetic progressions, J. Symbolic Computation (1990), 9, pp. 251-280.
    • (1990) J. Symbolic Computation , vol.9 , pp. 251-280
    • Coppersmith, D.1    Winograd, S.2
  • 7
    • 23944453664 scopus 로고    scopus 로고
    • The Security of the Birational Permutation Signature Schemes
    • D. Coppersmith, J. Stern, S. Vaudenay, The Security of the Birational Permutation Signature Schemes, in Journal of Cryptology, 10(3), pp. 207-221, 1997.
    • (1997) Journal of Cryptology , vol.10 , Issue.3 , pp. 207-221
    • Coppersmith, D.1    Stern, J.2    Vaudenay, S.3
  • 10
    • 84937472064 scopus 로고    scopus 로고
    • The Minrank problem. MinRank, a new Zero-knowledge scheme based on the NP-complete problem
    • N. Courtois: The Minrank problem. MinRank, a new Zero-knowledge scheme based on the NP-complete problem. Presented at the rump session of Crypto 2000, available at http://www.minrank.org
    • The Rump Session of Crypto 2000
    • Courtois, N.1
  • 11
    • 84858245440 scopus 로고
    • Analysis of a public key approach based on polynomial substitutions
    • Springer-Verlag
    • H. Fell, W. Diffie, Analysis of a public key approach based on polynomial substitutions, in Advances in Cryptology, Proceedings of CRYPTO’85, LNCS no 218, Springer-Verlag, 1985, pp. 340-349.
    • (1985) Advances in Cryptology, Proceedings of CRYPTO’85, LNCS , vol.218 , pp. 340-349
    • Fell, H.1    Diffie, W.2
  • 13
    • 84937409243 scopus 로고
    • A new authentication algorithm
    • S. Harari, A new authentication algorithm, in Coding Theory and Applications, LNCS n◦ 388, Springer, 1989, pp. 204-211.
    • (1989) Coding Theory and Applications , pp. 204-211
    • Harari, S.1
  • 14
    • 84957060922 scopus 로고    scopus 로고
    • Cryptanalysis of the HFE public key cryptosystem, in Advances in Cryptology
    • Springer
    • A. Kipnis, A. Shamir, Cryptanalysis of the HFE public key cryptosystem, in Advances in Cryptology, Proceedings of Crypto’99, LNCS no 1666, Springer, 1999, pp. 19-30.
    • (1999) Proceedings of Crypto , vol.99 , Issue.1666 , pp. 19-30
    • Kipnis, A.1    Shamir, A.2
  • 15
    • 0033424342 scopus 로고    scopus 로고
    • A public key system with signature and master key functions
    • T.T. Moh, A public key system with signature and master key functions, Communications in Algebra, 27(5), pp. 2207-2222, 1999. Available at http://www.usdsi.com/public.ps
    • (1999) Communications in Algebra , vol.27 , Issue.5 , pp. 2207-2222
    • Moh, T.T.1
  • 17
    • 24944519031 scopus 로고    scopus 로고
    • Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two new families of asymmetric algorithms, in Advances in Cryptology
    • Springer Verlag
    • J. Patarin, Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of asymmetric algorithms, in Advances in Cryptology, Proceedings of EUROCRYPT’96, LNCS no 1070, Springer Verlag, 1996, pp. 33-48.
    • (1996) Proceedings of EUROCRYPT , vol.96 , Issue.1070 , pp. 33-48
    • Patarin, J.1
  • 18
    • 0010537086 scopus 로고    scopus 로고
    • Asymmetric cryptography with S-Boxes
    • Springer
    • J. Patarin, L. Goubin, Asymmetric cryptography with S-Boxes, in Proceedings of ICICS’97, LNCS no 1334, Springer, 1997, pp. 369-380.
    • (1997) Proceedings of ICICS , vol.97 , Issue.1334 , pp. 369-380
    • Patarin, J.1    Goubin, L.2
  • 20
    • 0012088291 scopus 로고
    • Efficient Signature Schemes based on Birational Permutations, in Advances in Cryptology
    • Springer-Verlag
    • A. Shamir, Efficient Signature Schemes based on Birational Permutations, in Advances in Cryptology, Proceedings of Crypto’93, LNCS no 773, Springer-Verlag, 1993, pp. 1-12.
    • (1993) Proceedings of Crypto , vol.93 , Issue.773 , pp. 1-12
    • Shamir, A.1
  • 21
    • 84955595109 scopus 로고
    • A new identification scheme based on syndrome decoding, in Advances in Cryptology
    • Springer-Verlag
    • J. Stern, A new identification scheme based on syndrome decoding, in Advances in Cryptology, Proceedings of CRYPTO’93, LNCS no 773, Springer-Verlag, 1993, pp. 13-21.
    • (1993) Proceedings of CRYPTO , vol.93 , Issue.773 , pp. 13-21
    • Stern, J.1
  • 22
    • 14844346471 scopus 로고
    • The cryptographic security of the Syndrome Decoding problem for rank distance codes, in Advances in Cryptology
    • Springer-Verlag
    • J. Stern, F. Chabaud, The cryptographic security of the Syndrome Decoding problem for rank distance codes, in Advances in Cryptology, Proceedings of ASIACRYPT’ 96, LNCS no 1163, Springer-Verlag, 1985, pp. 368-381.
    • (1985) Proceedings of ASIACRYPT , vol.96 , Issue.1163 , pp. 368-381
    • Stern, J.1    Chabaud, F.2
  • 23
    • 85018943442 scopus 로고    scopus 로고
    • The US Data Security Public-Key Contest, available at http://www.usdsi.com/contests.html


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.