Hidden Field Equations

Results: 25



#Item
11Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields Christopher Wolf & Enrico Thomae Horst Görtz Institute for IT-security Faculty of Mathematics

Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields Christopher Wolf & Enrico Thomae Horst Görtz Institute for IT-security Faculty of Mathematics

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-14 05:32:54
12A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery) Charles Bouillaguet1 , Pierre-Alain Fouque1 , Antoine Joux2,3 , and Joana Treger2 1 Ecole Normale Supérieure

A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery) Charles Bouillaguet1 , Pierre-Alain Fouque1 , Antoine Joux2,3 , and Joana Treger2 1 Ecole Normale Supérieure

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-15 10:42:41
13MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-30 04:23:42
14非可換性を利用した多変数多項式電子署名

非可換性を利用した多変数多項式電子署名

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:32:25
15MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems ⋆ Takanori Yasuda1 , Xavier Dahan1,6 , Yun-Ju Huang1,2 , Tsuyoshi Takagi1,3,4 , and Kouichi Sakurai1,5 1

MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems ⋆ Takanori Yasuda1 , Xavier Dahan1,6 , Yun-Ju Huang1,2 , Tsuyoshi Takagi1,3,4 , and Kouichi Sakurai1,5 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-26 06:14:31
16Multivariate Quadratic Hash Jintai Ding*, Bo-yin Yang** University of Cincinnati* Technical University of Darmstadt* Institute of Information Science, Academia Sinica**

Multivariate Quadratic Hash Jintai Ding*, Bo-yin Yang** University of Cincinnati* Technical University of Darmstadt* Institute of Information Science, Academia Sinica**

Add to Reading List

Source URL: www.fields.utoronto.ca

Language: English - Date: 2006-12-04 11:51:29
17ALGEBRAIC CRYPTANALYSIS OF AES: AN OVERVIEW HARRIS NOVER Abstract. In this paper, we examine algebraic attacks on the Advanced Encryption Standard (AES, also known as Rijndael). We begin with a brief review of the histor

ALGEBRAIC CRYPTANALYSIS OF AES: AN OVERVIEW HARRIS NOVER Abstract. In this paper, we examine algebraic attacks on the Advanced Encryption Standard (AES, also known as Rijndael). We begin with a brief review of the histor

Add to Reading List

Source URL: www.math.wisc.edu

Language: English - Date: 2004-12-15 08:27:50
18Selecting Parameters for the Rainbow Signature Scheme - Extended Version Albrecht Petzoldt1 , Stanislav Bulygin2 , and Johannes Buchmann1,2 1 Technische Universit¨ at Darmstadt, Department of Computer Science

Selecting Parameters for the Rainbow Signature Scheme - Extended Version Albrecht Petzoldt1 , Stanislav Bulygin2 , and Johannes Buchmann1,2 1 Technische Universit¨ at Darmstadt, Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-11 08:28:07
19Computational and Algebraic Aspects of the Advanced Encryption Standard Carlos Cid, Sean Murphy and Matthew Robshaw Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, U.K.

Computational and Algebraic Aspects of the Advanced Encryption Standard Carlos Cid, Sean Murphy and Matthew Robshaw Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, U.K.

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-03 11:48:26
20QUAD: a Practical Stream Cipher with Provable Security Cˆ

QUAD: a Practical Stream Cipher with Provable Security Cˆ

Add to Reading List

Source URL: crypto.rd.francetelecom.com

Language: English - Date: 2009-09-02 11:51:02