-
1
-
-
0017973512
-
On the inherent intractability of certain coding problems
-
May
-
E.R. Berlekamp, R.J. McEliece, H.C.A. Van Tilborg, On the inherent intractability of certain coding problems, IEEE Transactions on Information Theory, IT-24(3), pp. 384-386, May 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24 IT
, Issue.3
, pp. 384-386
-
-
Berlekamp, E.R.1
McEliece, R.J.2
Van Tilborg, H.3
-
2
-
-
84937429155
-
Asymptotic analysis of probabilistic algorithms for finding short codewords
-
Udine, Italy, CISM Courses and lectures no 339, Springer-Verlag
-
F. Chabaud, Asymptotic analysis of probabilistic algorithms for finding short codewords, in Proceedings of Eurocode’92, Udine, Italy, CISM Courses and lectures no 339, Springer-Verlag, 1993, pp. 217-228.
-
(1993)
Proceedings of Eurocode
, vol.92
, pp. 217-228
-
-
Chabaud, F.1
-
5
-
-
85023205150
-
Matrixm ultiplication via arithmetic progressions
-
D. Coppersmith, S. Winograd, Matrixm ultiplication via arithmetic progressions, J. Symbolic Computation (1990), 9, pp. 251-280.
-
(1990)
J. Symbolic Computation
, vol.9
, pp. 251-280
-
-
Coppersmith, D.1
Winograd, S.2
-
6
-
-
84949030831
-
Attacks on the Birational Permutation Signature Schemes
-
Springer-Verlag
-
D. Coppersmith, J. Stern, S. Vaudenay, Attacks on the Birational Permutation Signature Schemes, in Advances in Cryptology, Proceedings of Crypto’93, LNCS no 773, Springer-Verlag, 1993, pp. 435-443.
-
(1993)
Advances in Cryptology, Proceedings of Crypto’93, LNCS
, vol.773
, pp. 435-443
-
-
Coppersmith, D.1
Stern, J.2
Vaudenay, S.3
-
7
-
-
23944453664
-
The Security of the Birational Permutation Signature Schemes
-
D. Coppersmith, J. Stern, S. Vaudenay, The Security of the Birational Permutation Signature Schemes, in Journal of Cryptology, 10(3), pp. 207-221, 1997.
-
(1997)
Journal of Cryptology
, vol.10
, Issue.3
, pp. 207-221
-
-
Coppersmith, D.1
Stern, J.2
Vaudenay, S.3
-
8
-
-
77649327985
-
Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations
-
Springer
-
N. Courtois, A. Shamir, J. Patarin, A. Klimov, Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations, in Advances in Cryptology, Proceedings of EUROCRYPT’2000, LNCS no 807, Springer, 2000, pp. 392-407.
-
(2000)
Advances in Cryptology, Proceedings of EUROCRYPT’2000, LNCS
, vol.807
, pp. 392-407
-
-
Courtois, N.1
Shamir, A.2
Patarin, J.3
Klimov, A.4
-
9
-
-
33645586143
-
-
IP, MinRank, et HFE, PhDt hesis, Paris 6 University, 26 September 2000, partly in English
-
N. Courtois: La sécurité des primitives cryptographiques basées sur les problèmes algébriques multivariables MQ, IP, MinRank, et HFE, PhDt hesis, Paris 6 University, 26 September 2000, partly in English.
-
La sécurité Des Primitives Cryptographiques basées Sur Les problèmes algébriques Multivariables MQ
-
-
Courtois, N.1
-
10
-
-
84937472064
-
The Minrank problem. MinRank, a new Zero-knowledge scheme based on the NP-complete problem
-
N. Courtois: The Minrank problem. MinRank, a new Zero-knowledge scheme based on the NP-complete problem. Presented at the rump session of Crypto 2000, available at http://www.minrank.org
-
The Rump Session of Crypto 2000
-
-
Courtois, N.1
-
11
-
-
84858245440
-
Analysis of a public key approach based on polynomial substitutions
-
Springer-Verlag
-
H. Fell, W. Diffie, Analysis of a public key approach based on polynomial substitutions, in Advances in Cryptology, Proceedings of CRYPTO’85, LNCS no 218, Springer-Verlag, 1985, pp. 340-349.
-
(1985)
Advances in Cryptology, Proceedings of CRYPTO’85, LNCS
, vol.218
, pp. 340-349
-
-
Fell, H.1
Diffie, W.2
-
13
-
-
84937409243
-
A new authentication algorithm
-
S. Harari, A new authentication algorithm, in Coding Theory and Applications, LNCS n◦ 388, Springer, 1989, pp. 204-211.
-
(1989)
Coding Theory and Applications
, pp. 204-211
-
-
Harari, S.1
-
14
-
-
84957060922
-
Cryptanalysis of the HFE public key cryptosystem, in Advances in Cryptology
-
Springer
-
A. Kipnis, A. Shamir, Cryptanalysis of the HFE public key cryptosystem, in Advances in Cryptology, Proceedings of Crypto’99, LNCS no 1666, Springer, 1999, pp. 19-30.
-
(1999)
Proceedings of Crypto
, vol.99
, Issue.1666
, pp. 19-30
-
-
Kipnis, A.1
Shamir, A.2
-
15
-
-
0033424342
-
A public key system with signature and master key functions
-
T.T. Moh, A public key system with signature and master key functions, Communications in Algebra, 27(5), pp. 2207-2222, 1999. Available at http://www.usdsi.com/public.ps
-
(1999)
Communications in Algebra
, vol.27
, Issue.5
, pp. 2207-2222
-
-
Moh, T.T.1
-
17
-
-
24944519031
-
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two new families of asymmetric algorithms, in Advances in Cryptology
-
Springer Verlag
-
J. Patarin, Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of asymmetric algorithms, in Advances in Cryptology, Proceedings of EUROCRYPT’96, LNCS no 1070, Springer Verlag, 1996, pp. 33-48.
-
(1996)
Proceedings of EUROCRYPT
, vol.96
, Issue.1070
, pp. 33-48
-
-
Patarin, J.1
-
18
-
-
0010537086
-
Asymmetric cryptography with S-Boxes
-
Springer
-
J. Patarin, L. Goubin, Asymmetric cryptography with S-Boxes, in Proceedings of ICICS’97, LNCS no 1334, Springer, 1997, pp. 369-380.
-
(1997)
Proceedings of ICICS
, vol.97
, Issue.1334
, pp. 369-380
-
-
Patarin, J.1
Goubin, L.2
-
19
-
-
84882718067
-
-
RICS series report, Aarhus, Denmark, RS-96-33
-
J.O. Shallit, G.S. Frandsen, J.F. Buss, The computational complexity of some problems of linear algebra, BRICS series report, Aarhus, Denmark, RS-96-33. Available at http://www.brics.dk/RS/96/33
-
The Computational Complexity of Some Problems of Linear Algebra
-
-
Shallit, J.O.1
Frandsen, G.S.2
Buss, J.F.3
-
20
-
-
0012088291
-
Efficient Signature Schemes based on Birational Permutations, in Advances in Cryptology
-
Springer-Verlag
-
A. Shamir, Efficient Signature Schemes based on Birational Permutations, in Advances in Cryptology, Proceedings of Crypto’93, LNCS no 773, Springer-Verlag, 1993, pp. 1-12.
-
(1993)
Proceedings of Crypto
, vol.93
, Issue.773
, pp. 1-12
-
-
Shamir, A.1
-
21
-
-
84955595109
-
A new identification scheme based on syndrome decoding, in Advances in Cryptology
-
Springer-Verlag
-
J. Stern, A new identification scheme based on syndrome decoding, in Advances in Cryptology, Proceedings of CRYPTO’93, LNCS no 773, Springer-Verlag, 1993, pp. 13-21.
-
(1993)
Proceedings of CRYPTO
, vol.93
, Issue.773
, pp. 13-21
-
-
Stern, J.1
-
22
-
-
14844346471
-
The cryptographic security of the Syndrome Decoding problem for rank distance codes, in Advances in Cryptology
-
Springer-Verlag
-
J. Stern, F. Chabaud, The cryptographic security of the Syndrome Decoding problem for rank distance codes, in Advances in Cryptology, Proceedings of ASIACRYPT’ 96, LNCS no 1163, Springer-Verlag, 1985, pp. 368-381.
-
(1985)
Proceedings of ASIACRYPT
, vol.96
, Issue.1163
, pp. 368-381
-
-
Stern, J.1
Chabaud, F.2
-
23
-
-
85018943442
-
-
The US Data Security Public-Key Contest, available at http://www.usdsi.com/contests.html
-
-
-
|