Multivariate cryptography

Results: 24



#Item
1-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1  University of Cincinnati and Technische Universität Darmstadt

-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1 University of Cincinnati and Technische Universität Darmstadt

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-03-20 04:03:42
2Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1  3

Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2012-04-04 23:26:12
3Multivariate Cryptography Louis Goubin, Versailles St-Quentin-en-Yvelines University, France, Jacques Patarin, Versailles St-Quentin-en-Yvelines University, France, and Bo-Yin Yang, Institute of Information Science, Acad

Multivariate Cryptography Louis Goubin, Versailles St-Quentin-en-Yvelines University, France, Jacques Patarin, Versailles St-Quentin-en-Yvelines University, France, and Bo-Yin Yang, Institute of Information Science, Acad

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2013-03-31 09:28:56
4Multivariate Public Key Cryptography Jintai Ding 1  2

Multivariate Public Key Cryptography Jintai Ding 1 2

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2013-03-10 22:42:02
5Introduction  The MQ Problem Polynomial Equivalence Problems

Introduction The MQ Problem Polynomial Equivalence Problems

Add to Reading List

Source URL: caramba.loria.fr

Language: English - Date: 2016-06-13 15:37:32
6Multivariate Cryptography 2WC12 Cryptography I – Fall 2013 Ruben Niederhagen  December 5th, 2013

Multivariate Cryptography 2WC12 Cryptography I – Fall 2013 Ruben Niederhagen December 5th, 2013

Add to Reading List

Source URL: polycephaly.org

Language: English - Date: 2014-04-30 08:37:31
    7A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae  PKC 2015, March 30 - April 1, Maryland, USA

    A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae PKC 2015, March 30 - April 1, Maryland, USA

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2015-03-29 21:02:40
    8

    PDF Document

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-04-02 10:55:50
    9

    PDF Document

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-04-09 09:56:04
    10Superfluous Keys in Multivariate Quadratic Asymmetric Systems Christopher Wolf and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {Christopher.Wolf,Bart.Preneel}@esat.kuleuven

    Superfluous Keys in Multivariate Quadratic Asymmetric Systems Christopher Wolf and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {Christopher.Wolf,Bart.Preneel}@esat.kuleuven

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2005-01-28 03:37:27