×

Found 58 Documents (Results 1–58)

Design principles for HFEv- based multivariate signature schemes. (English) Zbl 1396.94094

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 311-334 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Authenticated key exchange from ideal lattices. (English) Zbl 1375.94164

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 719-751 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

A practical attack on patched MIFARE Classic. (English) Zbl 1347.94028

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 150-164 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

ZHFE, a new multivariate public key encryption scheme. (English) Zbl 1385.94065

Mosca, Michele (ed.), Post-quantum cryptography. 6th international workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1–3, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-11658-7/pbk). Lecture Notes in Computer Science 8772, 229-245 (2014).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

The cubic simple matrix encryption scheme. (English) Zbl 1306.94045

Mosca, Michele (ed.), Post-quantum cryptography. 6th international workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1–3, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-11658-7/pbk). Lecture Notes in Computer Science 8772, 76-87 (2014).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Solving degree and degree of regularity for polynomial systems over a finite field. (English) Zbl 1291.94074

Fischlin, Marc (ed.) et al., Number theory and cryptography. Papers in honor of Johannes Buchmann on the occasion of his 60th birthday. Berlin: Springer (ISBN 978-3-642-42000-9/pbk). Lecture Notes in Computer Science 8260, 34-49 (2013).
MSC:  94A60 12Y05 11T71
PDFBibTeX XMLCite
Full Text: DOI
[Ball, L. Simeon; Blake, Ian; Blokhuis, Aart; Cioaba, Sebastian M.; Colbourn, Charles J.; Ding, Jintai; Dinitz, Jeffrey H.; Dumas, Jean-Guillaume; Ebert, Gary; Effinger, Gove; Enge, Andreas; Fan, Haining; Gong, Guang; Goss, David; Gupta, Kishan Chand; Hasan, M. Anwarul; Hinkelmann, Franziska; Hirschfeld, James W. P.; Huffman, W. Cary; Jedwab, Jonathan; Jungnickel, Dieter; Laubenbacher, Reinhard; Litsyn, Simon; Menezes, Alfred; Mullen, Gary L.; Murty, Kumar; Murty, M. Ram; Niederreiter, Harald; Pernet, Clément; Pott, Alexander; Roetteler, Martin; Schmidt, Kai-Uwe; Stevens, Brett; Storme, Leo; Takeshita, Oscar; Thas, Joseph A.; Thériault, Nicolas; Wan, Zhe-Xian; Winterhof, Arne; Gow, Roderick; Panario, Daniel; Thomson, David; Yucas, Joseph L.; Kyuregyan, Melsik; Ahmadi, Omran; Cohen, Stephen D.; Hou, Xiang-dong; Voloch, Jose Felipe; Gao, Shuhong; Liao, Qunying; Hachenberger, Dirk; Evans, Ronald J.; Rojas-Leon, Antonio; Ostafe, Alina; Garaev, Moubariz Z.; Fitzgerald, Robert; Castro, Francis; Rubio, Ivelisse; Lidl, Rudolf; Zieve, Michael E.; Carlet, Claude; Charpin, Pascale; Kholosha, Alexander; Coulter, Robert; Wang, Qiang; Fried, Michael D.; McGuire, Gary; Helleseth, Tor; Meidl, Wilfried; Shparlinski, Igor; Doche, Christophe; Giesbrecht, Mark; von zur Gathen, Joachim; Kaltofen, Erich; Lecerf, Gregoire; Odlyzko, Andrew; de Smit, Bart; Lenstra, Hendrik; Silverman, Joseph; Bernstein, Daniel J.; Lange, Tanja; Jacobson, Michael John jun.; Scheidler, Renate; Garcia, Arnaldo; Stichtenoth, Henning; Fu, Lei; Blache, Regis; Wan, Daqing]

Handbook of finite fields. (English) Zbl 1319.11001

Discrete Mathematics and Its Applications. Boca Raton, FL: CRC Press (ISBN 978-1-4398-7378-6/hbk; 978-1-4398-7382-3/ebook). xxxv, 1033 p. (2013).
PDFBibTeX XMLCite
Full Text: DOI

Simple matrix scheme for encryption. (English) Zbl 1306.94094

Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 231-242 (2013).
MSC:  94A60 81P94 11T71
PDFBibTeX XMLCite
Full Text: DOI

Embedded surface attack on multivariate public key cryptosystems from Diophantine equations. (English) Zbl 1311.94078

Kutyłowski, Mirosław (ed.) et al., Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). Lecture Notes in Computer Science 7763, 122-136 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An algebraic broadcast attack against NTRU. (English) Zbl 1305.94041

Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 124-137 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

High-speed hardware implementation of Rainbow signature on FPGAs. (English) Zbl 1298.94107

Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 228-243 (2011).
MSC:  94A60 81P94 11T71
PDFBibTeX XMLCite
Full Text: DOI

Inverting HFE systems is quasi-polynomial for all fields. (English) Zbl 1287.94064

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 724-742 (2011).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: DOI

Kipnis-Shamir attack on unbalanced oil-vinegar scheme. (English) Zbl 1326.94079

Bao, Feng (ed.) et al., Information security practice and experience. 7th international conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21030-3/pbk). Lecture Notes in Computer Science 6672, 168-180 (2011).
MSC:  94A60 11T71 94A62
PDFBibTeX XMLCite
Full Text: DOI

Practical algebraic cryptanalysis for dragon-based cryptosystems. (English) Zbl 1294.94035

Heng, Swee-Huay (ed.) et al., Cryptology and network security. 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12–14, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17618-0/pbk). Lecture Notes in Computer Science 6467, 140-155 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

MXL\(_3\): an efficient algorithm for computing Gröbner bases of zero-dimensional ideals. (English) Zbl 1305.94066

Lee, Donghoon (ed.) et al., Information, security and cryptology – ICISC 2009. 12th international conference, Seoul, Korea, December 2–4, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14422-6/pbk). Lecture Notes in Computer Science 5984, 87-100 (2010).
MSC:  94A60 13P10
PDFBibTeX XMLCite
Full Text: DOI

Algebraic cryptanalysis of SMS4: Gröbner basis attack and SAT attack compared. (English) Zbl 1305.94045

Lee, Donghoon (ed.) et al., Information, security and cryptology – ICISC 2009. 12th international conference, Seoul, Korea, December 2–4, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14422-6/pbk). Lecture Notes in Computer Science 5984, 73-86 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure variants of the Square encryption scheme. (English) Zbl 1286.94063

Sendrier, Nicolas (ed.), Post-quantum cryptography. Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12928-5/pbk). Lecture Notes in Computer Science 6061, 153-164 (2010).
MSC:  94A60 81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of two quartic encryption schemes and one improved MFE scheme. (English) Zbl 1284.94061

Sendrier, Nicolas (ed.), Post-quantum cryptography. Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12928-5/pbk). Lecture Notes in Computer Science 6061, 41-60 (2010).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Mutant Zhuang-Zi algorithm. (English) Zbl 1284.94070

Sendrier, Nicolas (ed.), Post-quantum cryptography. Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12928-5/pbk). Lecture Notes in Computer Science 6061, 28-40 (2010).
MSC:  94A60 81P94 13P10
PDFBibTeX XMLCite
Full Text: DOI

Growth of the ideal generated by a quadratic Boolean function. (English) Zbl 1284.94069

Sendrier, Nicolas (ed.), Post-quantum cryptography. Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12928-5/pbk). Lecture Notes in Computer Science 6061, 13-27 (2010).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: DOI

Flexible partial enlargement to accelerate Gröbner basis computation over \(\mathbb{F}_2\). (English) Zbl 1284.94058

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 69-81 (2010).
MSC:  94A60 13P10 68W30
PDFBibTeX XMLCite
Full Text: DOI

Algebraic attack on the MQQ public key cryptosystem. (English) Zbl 1287.94087

Garay, Juan A. (ed.) et al., Cryptology and network security. 8th international conference, CANS 2009, Kanazawa, Japan, December 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10432-9/pbk). Lecture Notes in Computer Science 5888, 392-401 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

SSE implementation of multivariate PKCs on modern x86 CPUs. (English) Zbl 1290.94055

Clavier, Christophe (ed.) et al., Cryptographic hardware and embedded systems – CHES 2009. 11th international workshop Lausanne, Switzerland, September 6–9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04137-2/pbk). Lecture Notes in Computer Science 5747, 33-48 (2009).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Square, a new multivariate encryption scheme. (English) Zbl 1237.94055

Fischlin, Marc (ed.), Topics in cryptology – CT-RSA 2009. The cryptographers’ track at the RSA conference 2009, San Francisco, CA, USA, April 20–24, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00861-0/pbk). Lecture Notes in Computer Science 5473, 252-264 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Multivariate public Key cryptography. (English) Zbl 1161.81319

Bernstein, Daniel J. (ed.) et al., Post-quantum cryptography. First international workshop PQCrypto 2006, Leuven, The Netherland, May 23–26, 2006. Selected papers. Berlin: Springer (ISBN 978-3-540-88701-0/hbk; 978-3-540-88702-7/ebook). 193-241 (2009).
MSC:  81P68 94A60
PDFBibTeX XMLCite
Full Text: DOI

Kipnis-Shamir attack on HFE revisited. (English) Zbl 1166.94318

Pei, Dingyi (ed.) et al., Information security and cryptology. Third SKLOIS conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-79498-1/pbk). Lecture Notes in Computer Science 4990, 399-411 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Multivariates polynomials for hashing. (English) Zbl 1166.94309

Pei, Dingyi (ed.) et al., Information security and cryptology. Third SKLOIS conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-79498-1/pbk). Lecture Notes in Computer Science 4990, 358-371 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

MXL2: Solving polynomial equations over \(\text{GF}(2)\) using an improved mutant strategy. (English) Zbl 1177.11094

Buchmann, Johannes (ed.) et al., Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). Lecture Notes in Computer Science 5299, 203-215 (2008).
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of rational multivariate public key cryptosystems. (English) Zbl 1177.94143

Buchmann, Johannes (ed.) et al., Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). Lecture Notes in Computer Science 5299, 124-136 (2008).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI Link

Square-Vinegar signature scheme. (English) Zbl 1177.94180

Buchmann, Johannes (ed.) et al., Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). Lecture Notes in Computer Science 5299, 17-30 (2008).
MSC:  94A62 94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. (English) Zbl 1147.94002

Lecture Notes in Computer Science 5299. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). x, 231 p. (2008).
PDFBibTeX XMLCite
Full Text: DOI

Could SFLASH be repaired? (English) Zbl 1155.94365

Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 691-701 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

New differential-algebraic attacks and reparametrization of rainbow. (English) Zbl 1319.94060

Bellovin, Steven M. (ed.) et al., Applied cryptography and network security. 6th international conference, ACNS 2008, New York, NY, USA, June 3–6, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68913-3/pbk). Lecture Notes in Computer Science 5037, 242-257 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the TRMC-4 public key cryptosystem. (English) Zbl 1214.94053

Katz, Jonathan (ed.) et al., Applied cryptography and network security. 5th international conference, ACNS 2007, Zhuhai, China, June 5–8, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72737-8/pbk). Lecture Notes in Computer Science 4521, 104-115 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Analysis of the SMS4 block cipher. (English) Zbl 1213.94121

Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 158-170 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

\(\ell \)-invertible cycles for Multivariate Quadratic (MQ) public key cryptography. (English) Zbl 1161.94006

Okamoto, Tatsuaki (ed.) et al., Public key cryptography – PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71676-1/pbk). Lecture Notes in Computer Science 4450, 266-281 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

High order linearization equation (hole) attack on multivariate public key cryptosystems. (English) Zbl 1161.94395

Okamoto, Tatsuaki (ed.) et al., Public key cryptography – PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71676-1/pbk). Lecture Notes in Computer Science 4450, 233-248 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Multivariable public key cryptosystems. (English) Zbl 1122.94035

Huynh, Dinh V. (ed.) et al., Algebra and its applications. Proceedings of the international conference, Athens, OH, USA, March 22–26, 2005. Providence, RI: American Mathematical Society (AMS) (ISBN 0-8218-3842-3/pbk). Contemporary Mathematics 419, 79-94 (2006).
MSC:  94A60 11T71
PDFBibTeX XMLCite

Breaking a new instance of TTM cryptosystems. (English) Zbl 1151.94555

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 4th international conference, ACNS 2006, Singapore, June 6–9, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34703-8/pbk). Lecture Notes in Computer Science 3989, 210-225 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Dimension of the linearization equations of the Matsumoto-Imai cryptosystems. (English) Zbl 1151.94504

Ytrehus, Øyvind (ed.), Coding and cryptography. International workshop, WCC 2005, Bergen, Norway, March 14–18, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-35481-6/pbk). Lecture Notes in Computer Science 3969, 242-251 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Inoculating multivariate schemes against differential attacks. (English) Zbl 1151.94505

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 290-301 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Rainbow, a new multivariable polynomial signature scheme. (English) Zbl 1126.68393

Ioannidis, John (ed.) et al., Applied cryptography and network security. Third international conference, ACNS 2005, New York, NY, USA, June 7–10, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26223-7/pbk). Lecture Notes in Computer Science 3531, 164-175 (2005).
MSC:  94A60 68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Complexity estimates for the \(\mathbb F_4\) attack on the perturbed Matsumoto-Imai cryptosystem. (English) Zbl 1122.94034

Smart, Nigel P. (ed.), Cryptography and coding. 10th IMA international conference, Cirencester, UK, December 19–21, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30276-X/pbk). Lecture Notes in Computer Science 3796, 262-277 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of PASS II and MiniPass. (English) Zbl 1122.94419

Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 159-168 (2005).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of HFEv and internal perturbation of HFE. (English) Zbl 1081.94520

Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 288-301 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A new variant of the Matsumoto-Imai cryptosystem through perturbation. (English) Zbl 1198.94091

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 305-318 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software