Post-quantum cryptography

Results: 155



#Item
81Finite fields / Hidden Field Equations / Mathematics / Affine geometry / Affine transformation / Unbalanced Oil and Vinegar / Differential geometry / Multivariate cryptography / Frobenius group / Post-quantum cryptography / Geometry / Abstract algebra

Equivalent Keys in Multivariate Quadratic Public Key Systems Christopher Wolf1,2 , and Bart Preneel1 1 K.U.Leuven, ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-22 06:53:55
82Polynomials / Quadratic polynomial / Quadratic form / Homogeneous polynomial / Quadratic equation / Hidden Field Equations / Multivariate cryptography / Algebra / Mathematics / Post-quantum cryptography

MULTIVARIABLE PUBLIC–KEY CRYPTOSYSTEMS JINTAI DING, DIETER SCHMIDT Keywords: public-key, multivariable polynomials 1. Introduction Recently Landau and Diffie gave in a series of articles in the Notices of

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-09 16:39:00
83Post-quantum cryptography / Digital signature / Group signature / Ring signature / RSA / Digital Signature Algorithm / Key / Random oracle / ID-based encryption / Cryptography / Public-key cryptography / Key management

Solutions to Key Exposure Problem in Ring Signature Joseph K. Liu1 , and Duncan S. Wong2 1 Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-23 05:46:43
84Hidden Field Equations / Cryptography / Post-quantum cryptography / Public-key cryptography

A New Class of Multivariate Public Key Cryptosystem Constructed on the Basis of Message-Dependent Transformation Masao KASAHARA Faculty of Informatics, Osaka Gakuin University, Suita-shi, Japan. .

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-20 02:54:57
85Euclidean algorithm / McEliece cryptosystem / Differential equation / Equation solving / Vector space / Degree of a continuous mapping / Algebra / Mathematics / Post-quantum cryptography

Timing Attacks against the Syndrome Inversion in Code-based Cryptosystems Falko Strenzke 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-07 10:49:20
86Cryptography / Data / Computing / Internet standards / Cipher suite / Transport Layer Security / TLS-PSK / Public-key cryptography / HTTP Secure / Cryptographic protocols / Internet protocols / Secure communication

1 DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen and Jose Luis

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-18 07:49:31
87Coding theory / Error detection and correction / Theoretical computer science / Numerical analysis / McEliece cryptosystem / Post-quantum cryptography / Niederreiter cryptosystem / List decoding / Horner scheme / Mathematics / Public-key cryptography / Applied mathematics

Fast and Secure Root Finding for Code-based Cryptosystems Falko Strenzke 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-07 11:04:10
88Polynomials / Post-quantum cryptography / Computer algebra / Finite fields / Algebraic geometry / Hidden Field Equations / Multivariate cryptography / Gröbner basis / Field extension / Abstract algebra / Algebra / Mathematics

A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery) Charles Bouillaguet1 , Pierre-Alain Fouque1 , Antoine Joux2,3 , and Joana Treger2 1 Ecole Normale Supérieure

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-15 10:42:41
89Hidden Field Equations / Unbalanced Oil and Vinegar / Full Domain Hash / RSA / Digital signature / One-way function / Cryptography / Public-key cryptography / Post-quantum cryptography

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-30 04:23:42
90Finite fields / Hidden Field Equations / Quantum information science / QUAD / RSA / Quantum cryptography / Multivariate cryptography / Cryptography / Public-key cryptography / Post-quantum cryptography

非可換性を利用した多変数多項式電子署名

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:32:25
UPDATE