The nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutes
From MaRDI portal
Publication:2056690
DOI10.1007/978-3-030-77870-5_12zbMath1479.94310OpenAlexW3081971729MaRDI QIDQ2056690
Joshua Deaton, Bo-Yin Yang, Jintai Ding, Vishakha
Publication date: 8 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-77870-5_12
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- SimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryption
- Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17--19, 2008. Proceedings
- A new efficient algorithm for computing Gröbner bases \((F_4)\)
- Field lifting for smaller UOV public keys
- The singularity attack to the multivariate signature scheme HIMQ-3
- Multivariate public key cryptosystems
- Operating Degrees for XL vs. F4/F5 for Generic $\mathcal{M}Q$ with Number of Equations Linear in That of Variables
- Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited
- The Cubic Simple Matrix Encryption Scheme
- Fast Exhaustive Search for Quadratic Systems in $$\mathbb {F}_{2}$$ on FPGAs
- Equivalent keys in ℳultivariate uadratic public key systems
- The Degree of Regularity of HFE Systems
- Hybrid approach for solving multivariate systems over finite fields
- New Differential-Algebraic Attacks and Reparametrization of Rainbow
- Fast Exhaustive Search for Polynomial Systems in ${\mathbb{F}_2}$
- Rainbow, a New Multivariable Polynomial Signature Scheme
- Introduction to post-quantum cryptography
- New directions in cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- Unbalanced Oil and Vinegar Signature Schemes
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Solving Homogeneous Linear Equations Over GF(2) via Block Wiedemann Algorithm
- Linear Recurring Sequences for the UOV Key Generation Revisited
- Degree of Regularity for HFEv and HFEv-
- Simple Matrix Scheme for Encryption
- Inverting HFE Systems Is Quasi-Polynomial for All Fields
This page was built for publication: The nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutes