Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3803032

zbMath0655.94013MaRDI QIDQ3803032

Tsutomu Matsumoto, Hiroshi Imai

Publication date: 1988


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (79)

Post-quantum secure inner product functional encryption using multivariate public key cryptographyComputational quantum key distribution (CQKD) on decentralized ledger and blockchainCombinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption SchemePractical Cryptanalysis of k-ary $$C^*$$Multivariate Encryption Schemes Based on Polynomial Equations over Real NumbersBoolean ring cryptographic equation solvingA new perturbation algorithm and enhancing security of SFLASH signature schemeMPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applicationsAsymmetric Cryptography with a Hidden MonomialOn the security of biquadratic \(C^\ast\) public-key cryptosystems and its generalizationsA Secure Variant of the SRP Encryption Scheme with Shorter Private KeyInverting square systems algebraically is exponentialMI-T-HFE, A New Multivariate Signature SchemeOn tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\)The security of the birational permutation signature schemesOn enumeration of polynomial equivalence classesCryptanalysis of RGB, a mixed multivariate signature schemeCryptanalysis of HFE, multi-HFE and variants for odd and even characteristicAll in the \(C^*\) familyKey-recovery attacks on \(\mathsf{ASASA}\)Efficient public-key operation in multivariate schemesProjective interpolation of polynomial vectors and improved key recovery attack on SFLASHHomomorphic polynomial public key encapsulation over two hidden rings for quantum-safe key encapsulationImproving support-minors rank attacks: applications to G\textit{e}MSS and RainbowDelegating signing rights in a multivariate proxy signature schemeCryptanalysis of the TRMS Signature Scheme of PKC’05Extended multivariate public key cryptosystems with secure encryption functionRoadmap of post-quantum cryptography standardization: side-channel attacks and countermeasuresTransciphering framework for approximate homomorphic encryptionIPRainbow2F -- a new method for constructing efficient multivariate encryption schemesOn the equivalence of two post-quantum cryptographic familiesLattice-based public key cryptosystems invoking linear mapping maskPost-quantum key exchange for the Internet and the open quantum safe projectCryptanalysis of \textsf{LRainbow}: the lifted rainbow signature schemeSquare-Vinegar Signature SchemePractical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ℓIC-DerivativesNonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key CryptosystemsSecure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant StrategyRevisiting the Cubic UOV Signature SchemeEFLASH: a new multivariate encryption schemePublic key compression for constrained linear signature schemesError-correcting codes and cryptographySimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryptionA public-key encryption scheme based on non-linear indeterminate equationsOn the family of cubical multivariate cryptosystems based on the algebraic graph over finite commutative rings of characteristic 2On Multivariate Homogeneous Polynomial DecompositionPolynomial Equivalence Problems: Algorithmic and Theoretical AspectsKipnis-Shamir Attack on HFE RevisitedCryptanalysis of the extension field cancellation cryptosystemA Multivariate Encryption Scheme with RainbowAn efficient algorithm for decomposing multivariate polynomials and its applications to cryptographyPost-Quantum Cryptography: State of the ArtA new encryption scheme for multivariate quadratic systemsKey Recovery on Hidden Monomial Multivariate SchemesSquare, a New Multivariate Encryption SchemeRecent Developments in Multivariate Public Key CryptosystemsThe nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutesA public key cryptosystem using a group of permutation polynomialsAnalysis of multivariate encryption schemes: application to DobA Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom GeneratorsOn enumeration of polynomial equivalence classes and their application to MPKCGeneral Fault Attacks on Multivariate Public Key CryptosystemsOn Provable Security of UOV and HFE Signature Schemes against Chosen-Message AttackOn the Differential Security of Multivariate Public Key CryptosystemsCryptanalysis of the new TTS scheme in CHES 2004Security analysis via algebraic attack against ``a new encryption scheme for multivariate quadratic systemUnnamed ItemDetermining whether a given cryptographic function is a permutation of another given cryptographic function -- a problem in intellectual propertyUnnamed ItemCryptanalysis of the lifted unbalanced oil vinegar signature schemeA new post-quantum multivariate polynomial public key encapsulation algorithmOn Dynamical Systems of Large Girth or Cycle Indicator and Their Applications to Multivariate CryptographyThe Complexity of Public-Key CryptographyPolynomial-time algorithms for quadratic isomorphism of polynomials: the regular caseNew practical multivariate signatures from a nonlinear modifierOn the effect of projection on rank attacks in multivariate cryptographyVerifying post-quantum signatures in 8 kB of RAM




This page was built for publication: