The following pages link to (Q4343439):
Displaying 50 items.
- On tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\) (Q326290) (← links)
- Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic (Q356715) (← links)
- Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH (Q404920) (← links)
- Extended multivariate public key cryptosystems with secure encryption function (Q415979) (← links)
- SimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryption (Q492017) (← links)
- An efficient algorithm for decomposing multivariate polynomials and its applications to cryptography (Q733509) (← links)
- On enumeration of polynomial equivalence classes and their application to MPKC (Q765801) (← links)
- Partial known plaintext attack on Koyama scheme (Q1044714) (← links)
- Breaking a class of public-key cryptosystems with Euclid's algorithm (Q1179345) (← links)
- The security of the birational permutation signature schemes (Q1364903) (← links)
- A break of public key cryptosystem PKCY (Q1373853) (← links)
- Cryptanalysis of the Matsumoto and Imai public key scheme of EUROCRYPT '98 (Q1580542) (← links)
- EFLASH: a new multivariate encryption scheme (Q1726680) (← links)
- Cryptanalysis of the Wu-Dawson public key cryptosystem (Q1808848) (← links)
- An application of algebraic geometry to encryption: tame transformation method (Q1884054) (← links)
- Multivariate public key cryptosystems from Diophantine equations (Q1936497) (← links)
- Cryptanalysis of the extension field cancellation cryptosystem (Q2034996) (← links)
- The nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutes (Q2056690) (← links)
- A public key cryptosystem using a group of permutation polynomials (Q2057316) (← links)
- Analysis of multivariate encryption schemes: application to Dob (Q2061916) (← links)
- Security analysis via algebraic attack against ``a new encryption scheme for multivariate quadratic system'' (Q2079887) (← links)
- Cryptanalysis of the lifted unbalanced oil vinegar signature scheme (Q2102067) (← links)
- New practical multivariate signatures from a nonlinear modifier (Q2118527) (← links)
- On the effect of projection on rank attacks in multivariate cryptography (Q2118528) (← links)
- Verifying post-quantum signatures in 8 kB of RAM (Q2118545) (← links)
- Low-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2]\) (Q2139645) (← links)
- All in the \(C^*\) family (Q2182072) (← links)
- Key-recovery attacks on \(\mathsf{ASASA}\) (Q2413617) (← links)
- The implementation of cubic public keys based on a new family of algebraic graphs (Q2442946) (← links)
- On the security of biquadratic \(C^\ast\) public-key cryptosystems and its generalizations (Q2632838) (← links)
- Inverting square systems algebraically is exponential (Q2637324) (← links)
- A Multivariate Encryption Scheme with Rainbow (Q2801772) (← links)
- On Dynamical Systems of Large Girth or Cycle Indicator and Their Applications to Multivariate Cryptography (Q2866111) (← links)
- Revisiting the Cubic UOV Signature Scheme (Q2988348) (← links)
- General Fault Attacks on Multivariate Public Key Cryptosystems (Q3102780) (← links)
- On the Differential Security of Multivariate Public Key Cryptosystems (Q3102788) (← links)
- A Security Analysis of Uniformly-Layered Rainbow (Q3102798) (← links)
- Asymmetric Cryptography with a Hidden Monomial (Q3452338) (← links)
- MI-T-HFE, A New Multivariate Signature Scheme (Q3460097) (← links)
- Square-Vinegar Signature Scheme (Q3535348) (← links)
- Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems (Q3535359) (← links)
- Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects (Q3593087) (← links)
- Square, a New Multivariate Encryption Scheme (Q3623049) (← links)
- Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme (Q3728806) (← links)
- A public key system with signature and master key functions (Q4241652) (← links)
- Algebraic Attacks against Random Local Functions and Their Countermeasures (Q4600698) (← links)
- (Q4638056) (← links)
- (Q4691924) (← links)
- Recent Developments in Multivariate Public Key Cryptosystems (Q4964364) (← links)
- Computational quantum key distribution (CQKD) on decentralized ledger and blockchain (Q5034980) (← links)