Cryptanalysis of schemes based on pseudoinverse matrix
From MaRDI portal
Publication:2825277
DOI10.1007/s11859-016-1161-xzbMath1363.68078OpenAlexW2509004495MaRDI QIDQ2825277
JinHui Liu, Huanguo Zhang, JianWei Jia
Publication date: 6 October 2016
Published in: Wuhan University Journal of Natural Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11859-016-1161-x
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (2)
Exploiting higher computational efficiency index for computing outer generalized inverses ⋮ A general class of arbitrary order iterative methods for computing generalized inverses
Cites Work
- Unnamed Item
- Complexity of computation in finite fields
- Extended multivariate public key cryptosystems with secure encryption function
- Long term confidentiality: a survey
- Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography
- New multivariate-based certificateless hybrid signcryption scheme for multi-recipient
- Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions
- General Impossibility of Group Homomorphic Encryption in the Quantum World
This page was built for publication: Cryptanalysis of schemes based on pseudoinverse matrix