scientific article
From MaRDI portal
Publication:3803032
zbMath0655.94013MaRDI QIDQ3803032
Tsutomu Matsumoto, Hiroshi Imai
Publication date: 1988
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
complexityasymmetric cryptosystempublic transformationsquadratic n-variate polynomialssecret transformations
Related Items (79)
Post-quantum secure inner product functional encryption using multivariate public key cryptography ⋮ Computational quantum key distribution (CQKD) on decentralized ledger and blockchain ⋮ Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme ⋮ Practical Cryptanalysis of k-ary $$C^*$$ ⋮ Multivariate Encryption Schemes Based on Polynomial Equations over Real Numbers ⋮ Boolean ring cryptographic equation solving ⋮ A new perturbation algorithm and enhancing security of SFLASH signature scheme ⋮ MPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applications ⋮ Asymmetric Cryptography with a Hidden Monomial ⋮ On the security of biquadratic \(C^\ast\) public-key cryptosystems and its generalizations ⋮ A Secure Variant of the SRP Encryption Scheme with Shorter Private Key ⋮ Inverting square systems algebraically is exponential ⋮ MI-T-HFE, A New Multivariate Signature Scheme ⋮ On tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\) ⋮ The security of the birational permutation signature schemes ⋮ On enumeration of polynomial equivalence classes ⋮ Cryptanalysis of RGB, a mixed multivariate signature scheme ⋮ Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic ⋮ All in the \(C^*\) family ⋮ Key-recovery attacks on \(\mathsf{ASASA}\) ⋮ Efficient public-key operation in multivariate schemes ⋮ Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH ⋮ Homomorphic polynomial public key encapsulation over two hidden rings for quantum-safe key encapsulation ⋮ Improving support-minors rank attacks: applications to G\textit{e}MSS and Rainbow ⋮ Delegating signing rights in a multivariate proxy signature scheme ⋮ Cryptanalysis of the TRMS Signature Scheme of PKC’05 ⋮ Extended multivariate public key cryptosystems with secure encryption function ⋮ Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures ⋮ Transciphering framework for approximate homomorphic encryption ⋮ IPRainbow ⋮ 2F -- a new method for constructing efficient multivariate encryption schemes ⋮ On the equivalence of two post-quantum cryptographic families ⋮ Lattice-based public key cryptosystems invoking linear mapping mask ⋮ Post-quantum key exchange for the Internet and the open quantum safe project ⋮ Cryptanalysis of \textsf{LRainbow}: the lifted rainbow signature scheme ⋮ Square-Vinegar Signature Scheme ⋮ Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ℓIC-Derivatives ⋮ Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems ⋮ Secure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$ ⋮ MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy ⋮ Revisiting the Cubic UOV Signature Scheme ⋮ EFLASH: a new multivariate encryption scheme ⋮ Public key compression for constrained linear signature schemes ⋮ Error-correcting codes and cryptography ⋮ SimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryption ⋮ A public-key encryption scheme based on non-linear indeterminate equations ⋮ On the family of cubical multivariate cryptosystems based on the algebraic graph over finite commutative rings of characteristic 2 ⋮ On Multivariate Homogeneous Polynomial Decomposition ⋮ Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects ⋮ Kipnis-Shamir Attack on HFE Revisited ⋮ Cryptanalysis of the extension field cancellation cryptosystem ⋮ A Multivariate Encryption Scheme with Rainbow ⋮ An efficient algorithm for decomposing multivariate polynomials and its applications to cryptography ⋮ Post-Quantum Cryptography: State of the Art ⋮ A new encryption scheme for multivariate quadratic systems ⋮ Key Recovery on Hidden Monomial Multivariate Schemes ⋮ Square, a New Multivariate Encryption Scheme ⋮ Recent Developments in Multivariate Public Key Cryptosystems ⋮ The nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutes ⋮ A public key cryptosystem using a group of permutation polynomials ⋮ Analysis of multivariate encryption schemes: application to Dob ⋮ A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators ⋮ On enumeration of polynomial equivalence classes and their application to MPKC ⋮ General Fault Attacks on Multivariate Public Key Cryptosystems ⋮ On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack ⋮ On the Differential Security of Multivariate Public Key Cryptosystems ⋮ Cryptanalysis of the new TTS scheme in CHES 2004 ⋮ Security analysis via algebraic attack against ``a new encryption scheme for multivariate quadratic system ⋮ Unnamed Item ⋮ Determining whether a given cryptographic function is a permutation of another given cryptographic function -- a problem in intellectual property ⋮ Unnamed Item ⋮ Cryptanalysis of the lifted unbalanced oil vinegar signature scheme ⋮ A new post-quantum multivariate polynomial public key encapsulation algorithm ⋮ On Dynamical Systems of Large Girth or Cycle Indicator and Their Applications to Multivariate Cryptography ⋮ The Complexity of Public-Key Cryptography ⋮ Polynomial-time algorithms for quadratic isomorphism of polynomials: the regular case ⋮ New practical multivariate signatures from a nonlinear modifier ⋮ On the effect of projection on rank attacks in multivariate cryptography ⋮ Verifying post-quantum signatures in 8 kB of RAM
This page was built for publication: