×

Found 31 Documents (Results 1–31)

MI-T-HFE, a new multivariate signature scheme. (English) Zbl 1376.94050

Groth, Jens (ed.), Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15–17, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27238-2/pbk; 978-3-319-27239-9/ebook). Lecture Notes in Computer Science 9496, 43-56 (2015).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Kipnis-Shamir attack on unbalanced oil-vinegar scheme. (English) Zbl 1326.94079

Bao, Feng (ed.) et al., Information security practice and experience. 7th international conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21030-3/pbk). Lecture Notes in Computer Science 6672, 168-180 (2011).
MSC:  94A60 11T71 94A62
PDFBibTeX XMLCite
Full Text: DOI

Selecting parameters for the Rainbow signature scheme. (English) Zbl 1286.94084

Sendrier, Nicolas (ed.), Post-quantum cryptography. Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12928-5/pbk). Lecture Notes in Computer Science 6061, 218-240 (2010).
MSC:  94A60 81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI

Square, a new multivariate encryption scheme. (English) Zbl 1237.94055

Fischlin, Marc (ed.), Topics in cryptology – CT-RSA 2009. The cryptographers’ track at the RSA conference 2009, San Francisco, CA, USA, April 20–24, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00861-0/pbk). Lecture Notes in Computer Science 5473, 252-264 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Key recovery on hidden monomial multivariate schemes. (English) Zbl 1149.94313

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 19-30 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On building hash functions from multivariate quadratic equations. (English) Zbl 1213.94083

Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 82-95 (2007).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of SFLASH with slightly modified parameters. (English) Zbl 1141.94351

Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 264-275 (2007).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

High order linearization equation (hole) attack on multivariate public key cryptosystems. (English) Zbl 1161.94395

Okamoto, Tatsuaki (ed.) et al., Public key cryptography – PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71676-1/pbk). Lecture Notes in Computer Science 4450, 233-248 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Dimension of the linearization equations of the Matsumoto-Imai cryptosystems. (English) Zbl 1151.94504

Ytrehus, Øyvind (ed.), Coding and cryptography. International workshop, WCC 2005, Bergen, Norway, March 14–18, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-35481-6/pbk). Lecture Notes in Computer Science 3969, 242-251 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A “medium-field” multivariate public-key encryption scheme. (English) Zbl 1125.94028

Pointcheval, David (ed.), Topics in cryptology – CT-RSA 2006. The cryptographers’ track at the RSA conference 2006, San Jose, CA, USA, February 13–17, 2006. Proceedings. Berlin: Springer (ISBN 3-540-31033-9/pbk). Lecture Notes in Computer Science 3860, 132-149 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

All in the XL family: Theory and practice. (English) Zbl 1133.94336

Park, Choonsik (ed.) et al., Information security and cryptology – ICISC 2004. 7th international conference, Seoul, Korea, December 2–3, 2004. Revised Selected Papers. Berlin: Springer (ISBN 978-3-540-26226-8/pbk). Lecture Notes in Computer Science 3506, 67-86 (2005).
MSC:  94A60 68W30
PDFBibTeX XMLCite
Full Text: DOI

Rainbow, a new multivariable polynomial signature scheme. (English) Zbl 1126.68393

Ioannidis, John (ed.) et al., Applied cryptography and network security. Third international conference, ACNS 2005, New York, NY, USA, June 7–10, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26223-7/pbk). Lecture Notes in Computer Science 3531, 164-175 (2005).
MSC:  94A60 68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Building secure tame-like multivariate public-key cryptosystems: the new TTS. (English) Zbl 1127.94356

Boyd, Colin (ed.) et al., Information security and privacy. 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4–6, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26547-3/pbk). Lecture Notes in Computer Science 3574, 518-531 (2005).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of HFEv and internal perturbation of HFE. (English) Zbl 1081.94520

Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 288-301 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the tractable rational map cryptosystem. (English) Zbl 1081.94029

Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 258-274 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A new variant of the Matsumoto-Imai cryptosystem through perturbation. (English) Zbl 1198.94091

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 305-318 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Algebraic attacks over GF\((2^{k }\)), application to HFE challenge 2 and Sflash-v2. (English) Zbl 1198.94089

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 201-217 (2004).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

A more secure and efficacious TTS signature scheme. (English) Zbl 1092.94501

Lim, Jong In (ed.) et al., Information security and cryptology – ICISC 2003. 6th international conference, Seoul, Korea, November 27–28, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21376-7/pbk). Lecture Notes in Computer Science 2971, 320-338 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

TTS: High-speed signatures on a low-cost smart card. (English) Zbl 1104.68502

Joye, Marc (ed.) et al., Cryptographic hardware and embedded systems – CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11–13, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22666-4/pbk). Lecture Notes in Computer Science 3156, 371-385 (2004).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

On asymptotic security estimates in XL and Gröbner bases-related algebraic cryptanalysis. (English) Zbl 1109.94353

Lopez, Javier (ed.) et al., Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27–29, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23563-9/pbk). Lecture Notes in Computer Science 3269, 401-413 (2004).
MSC:  94A60 68Q25 68W30
PDFBibTeX XMLCite
Full Text: DOI

Solving underdefined systems of multivariate quadratic equations. (English) Zbl 1055.94534

Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 211-227 (2002).
MSC:  94A62 11T71
PDFBibTeX XMLCite
Full Text: Link

Generic attacks and the security of Quartz. (English) Zbl 1033.94517

Desmedt, Yvo G. (ed.) et al., Public key cryptography – PKC 2003. 6th international workshop on practice and theory in public key cryptography, Miami, FL, USA, January 6–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00324-X/pbk). Lect. Notes Comput. Sci. 2567, 351-364 (2002).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

A fast and secure implementation of Sflash. (English) Zbl 1033.94550

Desmedt, Yvo G. (ed.) et al., Public key cryptography – PKC 2003. 6th international workshop on practice and theory in public key cryptography, Miami, FL, USA, January 6–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00324-X/pbk). Lect. Notes Comput. Sci. 2567, 267-278 (2002).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

A theoretical DPA-based cryptanalysis of the NESSIE candidates FLASH and SFLASH. (English) Zbl 1042.68593

Davida, George I. (ed.) et al., Information security. 4th international conference, ISC 2001, Malaga, Spain, October 1–3, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42662-0). Lect. Notes Comput. Sci. 2200, 280-293 (2001).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: Link

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software