scientific article; zbMATH DE number 1030996

From MaRDI portal
Publication:4343439

zbMath0868.94025MaRDI QIDQ4343439

Jacques Patarin

Publication date: 6 July 1997


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (57)

Computational quantum key distribution (CQKD) on decentralized ledger and blockchainCombinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption SchemePractical Cryptanalysis of k-ary $$C^*$$An application of algebraic geometry to encryption: tame transformation methodA new perturbation algorithm and enhancing security of SFLASH signature schemeLow-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2\)] ⋮ Asymmetric Cryptography with a Hidden MonomialOn the security of biquadratic \(C^\ast\) public-key cryptosystems and its generalizationsA Secure Variant of the SRP Encryption Scheme with Shorter Private KeyInverting square systems algebraically is exponentialMI-T-HFE, A New Multivariate Signature SchemeOn tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\)Unnamed ItemThe security of the birational permutation signature schemesCryptanalysis of HFE, multi-HFE and variants for odd and even characteristicAll in the \(C^*\) familyKey-recovery attacks on \(\mathsf{ASASA}\)A multivariate identity-based broadcast encryption with applications to the Internet of ThingsAn algorithm for solving over-determined multivariate quadratic systems over finite fieldsProjective interpolation of polynomial vectors and improved key recovery attack on SFLASHMultivariate public key cryptosystems from Diophantine equationsExtended multivariate public key cryptosystems with secure encryption functionIPRainbowAlgebraic Attacks against Random Local Functions and Their CountermeasuresLattice-based public key cryptosystems invoking linear mapping maskThe implementation of cubic public keys based on a new family of algebraic graphsSquare-Vinegar Signature SchemeNonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key CryptosystemsQuantum Cryptography: Key Distribution and BeyondRevisiting the Cubic UOV Signature SchemeEFLASH: a new multivariate encryption schemeSimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryptionOn the family of cubical multivariate cryptosystems based on the algebraic graph over finite commutative rings of characteristic 2Revisiting the Efficient Key Generation of ZHFEPolynomial Equivalence Problems: Algorithmic and Theoretical AspectsAlgebraic Cryptanalysis of the Data Encryption StandardCryptanalysis of the extension field cancellation cryptosystemA Multivariate Encryption Scheme with RainbowAn efficient algorithm for decomposing multivariate polynomials and its applications to cryptographyKey Recovery on Hidden Monomial Multivariate SchemesSquare, a New Multivariate Encryption SchemeRecent Developments in Multivariate Public Key CryptosystemsThe nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutesA public key cryptosystem using a group of permutation polynomialsAnalysis of multivariate encryption schemes: application to DobOn enumeration of polynomial equivalence classes and their application to MPKCGeneral Fault Attacks on Multivariate Public Key CryptosystemsOn the Differential Security of Multivariate Public Key CryptosystemsA Security Analysis of Uniformly-Layered RainbowCryptanalysis of the new TTS scheme in CHES 2004Security analysis via algebraic attack against ``a new encryption scheme for multivariate quadratic systemUnnamed ItemCryptanalysis of the lifted unbalanced oil vinegar signature schemeOn Dynamical Systems of Large Girth or Cycle Indicator and Their Applications to Multivariate CryptographyNew practical multivariate signatures from a nonlinear modifierOn the effect of projection on rank attacks in multivariate cryptographyVerifying post-quantum signatures in 8 kB of RAM




This page was built for publication: