Hidden Field Equations

Results: 25



#Item
11Computer algebra / Numerical linear algebra / Finite fields / Algebraic geometry / Error detection and correction / Gröbner basis / Matrix / Hidden Field Equations / Gaussian elimination / Algebra / Mathematics / Abstract algebra

Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields Christopher Wolf & Enrico Thomae Horst Görtz Institute for IT-security Faculty of Mathematics

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-14 05:32:54
12Polynomials / Post-quantum cryptography / Computer algebra / Finite fields / Algebraic geometry / Hidden Field Equations / Multivariate cryptography / Gröbner basis / Field extension / Abstract algebra / Algebra / Mathematics

A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery) Charles Bouillaguet1 , Pierre-Alain Fouque1 , Antoine Joux2,3 , and Joana Treger2 1 Ecole Normale Supérieure

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-15 10:42:41
13Hidden Field Equations / Unbalanced Oil and Vinegar / Full Domain Hash / RSA / Digital signature / One-way function / Cryptography / Public-key cryptography / Post-quantum cryptography

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-30 04:23:42
14Finite fields / Hidden Field Equations / Quantum information science / QUAD / RSA / Quantum cryptography / Multivariate cryptography / Cryptography / Public-key cryptography / Post-quantum cryptography

非可換性を利用した多変数多項式電子署名

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:32:25
15Algebraic geometry / QUAD / Polynomials / Hidden Field Equations / XTR / System of polynomial equations / Quadratic / NP / XSL attack / Mathematics / Finite fields / Post-quantum cryptography

MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems ⋆ Takanori Yasuda1 , Xavier Dahan1,6 , Yun-Ju Huang1,2 , Tsuyoshi Takagi1,3,4 , and Kouichi Sakurai1,5 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-26 06:14:31
16Electronic commerce / Hidden Field Equations / RSA / QUAD / Key / Cryptographic hash function / Polynomial / Cryptography / Public-key cryptography / Post-quantum cryptography

Multivariate Quadratic Hash Jintai Ding*, Bo-yin Yang** University of Cincinnati* Technical University of Darmstadt* Institute of Information Science, Academia Sinica**

Add to Reading List

Source URL: www.fields.utoronto.ca

Language: English - Date: 2006-12-04 11:51:29
17Post-quantum cryptography / XSL attack / Key schedule / QUAD / Block cipher / Hidden Field Equations / Differential cryptanalysis / Q / Cipher / Cryptography / Advanced Encryption Standard / Stream ciphers

ALGEBRAIC CRYPTANALYSIS OF AES: AN OVERVIEW HARRIS NOVER Abstract. In this paper, we examine algebraic attacks on the Advanced Encryption Standard (AES, also known as Rijndael). We begin with a brief review of the histor

Add to Reading List

Source URL: www.math.wisc.edu

Language: English - Date: 2004-12-15 08:27:50
18Multivariate cryptography / QUAD / Unbalanced Oil and Vinegar / RSA / Proj construction / Hidden Field Equations / Cryptography / Post-quantum cryptography / Public-key cryptography

Selecting Parameters for the Rainbow Signature Scheme - Extended Version Albrecht Petzoldt1 , Stanislav Bulygin2 , and Johannes Buchmann1,2 1 Technische Universit¨ at Darmstadt, Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-11 08:28:07
19Stream ciphers / Message authentication codes / Block cipher / Data Encryption Standard / Cipher / Linear cryptanalysis / Nicolas Courtois / Key schedule / Hidden Field Equations / Cryptography / XSL attack / Advanced Encryption Standard

Computational and Algebraic Aspects of the Advanced Encryption Standard Carlos Cid, Sean Murphy and Matthew Robshaw Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, U.K.

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-03 11:48:26
20Algebra / QUAD / Keystream / Quadratic form / RC4 / Pseudorandom number generator / Hidden Field Equations / XTR / Quadratic / Cryptography / Stream ciphers / Mathematics

QUAD: a Practical Stream Cipher with Provable Security Cˆ

Add to Reading List

Source URL: crypto.rd.francetelecom.com

Language: English - Date: 2009-09-02 11:51:02
UPDATE