Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms

From MaRDI portal
Revision as of 19:30, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2876885

DOI10.1007/3-540-68339-9_4zbMath1301.94125OpenAlexW1821087317MaRDI QIDQ2876885

Jacques Patarin

Publication date: 20 August 2014

Published in: Advances in Cryptology — EUROCRYPT ’96 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-68339-9_4




Related Items (only showing first 100 items - show all)

Efficient key recovery for all HFE signature variantsStronger bounds on the cost of computing Gröbner bases for HFE systemsPost-quantum secure inner product functional encryption using multivariate public key cryptographyComputational quantum key distribution (CQKD) on decentralized ledger and blockchainCombinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption SchemeGeneralization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key EncryptionPractical Cryptanalysis of k-ary $$C^*$$A Rank Attack Against Extension Field CancellationMultivariate Encryption Schemes Based on Polynomial Equations over Real NumbersSolving the problem of blockwise isomorphism of polynomials with circulant matrices(Short paper) Simple matrix signature schemeBoolean ring cryptographic equation solvingAn application of algebraic geometry to encryption: tame transformation methodA new perturbation algorithm and enhancing security of SFLASH signature schemeCryptanalysis of a public key cryptosystem based on boolean permutationsNew Ideas to Build Noise-Free Homomorphic CryptosystemsEvaluation of Solving Time for Multivariate Quadratic Equation System Using XL Algorithm Over Small Finite Fields on GPUAsymmetric Cryptography with a Hidden MonomialA Secure Variant of the SRP Encryption Scheme with Shorter Private KeyThe Shortest Signatures EverLast Fall Degree, HFE, and Weil Descent Attacks on ECDLPMI-T-HFE, A New Multivariate Signature SchemeOn the security of stepwise triangular systemsOn tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\)Security analysis on an ElGamal-like multivariate encryption scheme based on isomorphism of polynomialsAn improved affine equivalence algorithm for random permutationsOn enumeration of polynomial equivalence classesCryptanalysis of RGB, a mixed multivariate signature schemeCryptanalysis of HFE, multi-HFE and variants for odd and even characteristicPractical post-quantum signature schemes from isomorphism problems of trilinear formsGeneral linear group action on tensors: a candidate for post-quantum cryptographyNew complexity estimation on the rainbow-band-separation attackComputing border bases using mutant strategiesKey-recovery attacks on \(\mathsf{ASASA}\)Isomorphism testing of read-once functions and polynomialsEnhanced matrix power function for cryptographic primitive constructionPermutation polynomials over finite fields involving \(x+x^q+\cdots +x^{q^{a-1}}\)Efficient public-key operation in multivariate schemesDembowski-Ostrom polynomials from reversed Dickson polynomialsCryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problemFrom 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based SignaturesFirst fall degree and Weil descentOn the last fall degree of zero-dimensional Weil descent systemsWhen does \(G(x)+\gamma \, \text{Tr}(H(x))\) permute \(\mathbb F_{p^n}\)?Cryptanalysis of the TRMS Signature Scheme of PKC’05Characteristic set algorithms for equation solving in finite fieldsOn the relation between the MXL family of algorithms and Gröbner basis algorithmsExtended multivariate public key cryptosystems with secure encryption functionOn the equivalence of two post-quantum cryptographic familiesThe complexity of solving Weil restriction systemsThe degree of regularity of a quadratic polynomialImprovements of algebraic attacks for solving the rank decoding and MinRank problemsSquare-Vinegar Signature SchemeNonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key CryptosystemsMXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant StrategyTowards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\)Revisiting the Cubic UOV Signature SchemeEFLASH: a new multivariate encryption schemePublic key compression for constrained linear signature schemesA general construction for monoid-based knapsack protocolsAlgorithms Based on *-Algebras, and Their Applications to Isomorphism of Polynomials with One Secret, Group Isomorphism, and Polynomial Identity TestingPoly-Dragon: an efficient multivariate public key cryptosystemSimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryptionMonkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYsA public-key encryption scheme based on non-linear indeterminate equationsA multivariate cryptosystem inspired by random linear codesPolynomial Equivalence Problems: Algorithmic and Theoretical AspectsUnnamed ItemKipnis-Shamir Attack on HFE RevisitedUnnamed ItemDembowski-Ostrom polynomials and reversed Dickson polynomialsCryptanalysis of the extension field cancellation cryptosystemA Multivariate Encryption Scheme with RainbowQUAD: A multivariate stream cipher with provable securityA new encryption scheme for multivariate quadratic systemsSquare, a New Multivariate Encryption SchemeAn improved signature model of multivariate polynomial public key cryptosystem against key recovery attackRecent Developments in Multivariate Public Key CryptosystemsHybrid MQ Signature for Embedded DeviceCryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)A public key cryptosystem using a group of permutation polynomialsDeterminant Equivalence Test over Finite Fields and over QAnalysis of multivariate encryption schemes: application to DobMultivariate public key cryptosystem from Sidon spacesPractical complexities of probabilistic algorithms for solving Boolean polynomial systemsOn enumeration of polynomial equivalence classes and their application to MPKCGeneral Fault Attacks on Multivariate Public Key CryptosystemsOn Provable Security of UOV and HFE Signature Schemes against Chosen-Message AttackRoots of Square: Cryptanalysis of Double-Layer Square and Square+Efficient Algorithms for Supersingular Isogeny Diffie-HellmanSecurity analysis via algebraic attack against ``a new encryption scheme for multivariate quadratic systemWhy you cannot even hope to use Gröbner bases in cryptography: an eternal golden braid of failuresChosen ciphertext attack on ZHFEDetermining whether a given cryptographic function is a permutation of another given cryptographic function -- a problem in intellectual propertyA new post-quantum multivariate polynomial public key encapsulation algorithmOn Dynamical Systems of Large Girth or Cycle Indicator and Their Applications to Multivariate CryptographyThe Complexity of Public-Key CryptographyPolynomial-time algorithms for quadratic isomorphism of polynomials: the regular caseOn the effect of projection on rank attacks in multivariate cryptographyVerifying post-quantum signatures in 8 kB of RAM







This page was built for publication: Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms