Analysis of multivariate encryption schemes: application to Dob and \(C^*\)
From MaRDI portal
Publication:6536745
DOI10.1007/s00145-024-09501-wzbMATH Open1539.94026MaRDI QIDQ6536745
Patrick Felke, Håvard Raddum, Morten Øygarden
Publication date: 13 May 2024
Published in: Journal of Cryptology (Search for Journal in Brave)
Cryptography (94A60) Gröbner bases; other bases for ideals and modules (e.g., Janet and border bases) (13P10) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic
- SimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryption
- Cryptanalysis of the multivariate encryption scheme EFLASH
- A new efficient algorithm for computing Gröbner bases \((F_4)\)
- Improved cryptanalysis of HFEv- via projection
- Two-Face: new public key multivariate schemes
- EFLASH: a new multivariate encryption scheme
- Analysis of multivariate encryption schemes: application to Dob
- Efficient key recovery for all HFE signature variants
- Solving degree, last fall degree, and related invariants
- All in the \(C^*\) family
- Improvements of algebraic attacks for solving the rank decoding and MinRank problems
- Extension Field Cancellation: A New Central Trapdoor for Multivariate Quadratic Systems
- Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
- Equivalent keys in ℳultivariate uadratic public key systems
- Hybrid approach for solving multivariate systems over finite fields
- Cryptanalysis of MinRank
- Solving sparse linear equations over finite fields
- Solving Quadratic Equations with XL on Parallel Architectures
- Almost perfect nonlinear power functions on GF(2/sup n/): the Welch case
- Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme
- A Rank Attack Against Extension Field Cancellation
- Multivariate Encryption Schemes Based on Polynomial Equations over Real Numbers
- Inverting HFE Systems Is Quasi-Polynomial for All Fields
- Differential Cryptanalysis for Multivariate Schemes
- Advances in Cryptology - CRYPTO 2003
- Public Key Cryptography - PKC 2005
- Cryptanalysis of HFE with Internal Perturbation
- Public Key Cryptography - PKC 2006
- Coding and Cryptography
- Public Key Cryptography – PKC 2004
This page was built for publication: Analysis of multivariate encryption schemes: application to Dob and \(C^*\)