Multivariate public key cryptosystems
From MaRDI portal
Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02) Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Applications to coding theory and cryptography of arithmetic geometry (14G50) Authentication, digital signatures and secret sharing (94A62)
Recommendations
Cited in
(55)- Total break of the SRP encryption scheme
- Cryptanalysis of the lifted unbalanced oil vinegar signature scheme
- On Schubert cells in Grassmannians and new algorithms of multivariate cryptography
- A multivariate encryption scheme with Rainbow
- Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH
- Algebraic cryptanalysis of Yasuda, Takagi and Sakurai's signature scheme
- Extended multivariate public key cryptosystems with secure encryption function
- Ring theory
- Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystems
- scientific article; zbMATH DE number 6001304 (Why is no real title available?)
- scientific article; zbMATH DE number 5149704 (Why is no real title available?)
- On multivariate cryptosystems based on computable maps with invertible decomposition
- On new examples of families of multivariate stable maps and their cryptographical applications
- Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction
- scientific article; zbMATH DE number 5009203 (Why is no real title available?)
- On the differential security of multivariate public key cryptosystems
- On Eulerian semigroups of multivariate transformations and their cryptographic applications
- Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ℓIC-Derivatives
- A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus
- The nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutes
- Explicit estimates for polynomial systems defining irreducible smooth complete intersections
- Kipnis-Shamir Attack on HFE Revisited
- SSE Implementation of Multivariate PKCs on Modern x86 CPUs
- On new protocols of Noncommutative Cryptography in terms of homomorphism of stable multivariate transformation groups
- A security analysis of uniformly-layered Rainbow defined over non-commutative rings
- Multivariate public key cryptosystems from Diophantine equations
- On tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\)
- Multivariate encryption schemes based on polynomial equations over real numbers
- Fast correlation attack on stream cipher ABC v3
- The shortest signatures ever
- New complexity estimation on the rainbow-band-separation attack
- Polynomial selection for computing Gröbner bases
- On enumeration of polynomial equivalence classes and their application to MPKC
- Key variation technique based on piggybacking strategies under public key environments
- A public key cryptosystem using a group of permutation polynomials
- Security analysis via algebraic attack against ``a new encryption scheme for multivariate quadratic system
- Consensus networks over finite fields
- On dynamical systems of large girth or cycle indicator and their applications to multivariate cryptography
- A new perturbation algorithm and enhancing security of SFLASH signature scheme
- SimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryption
- On the equivalent keys in multivariate cryptosystems
- Hybrid MQ Signature for Embedded Device
- Multivariate public key cryptosystems
- A multivariate based threshold ring signature scheme
- Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials
- A study on randomness used in signature generation of UOV
- Multivariate Public Key Cryptography
- A new central map for multivariate encryption scheme
- Overview of Cryptanalysis Techniques in Multivariate Public Key Cryptography
- High-speed hardware implementation of Rainbow signature on FPGAs
- A key exchange protocol relying on polynomial maps
- On the family of cubical multivariate cryptosystems based on the algebraic graph over finite commutative rings of characteristic 2
- Information Security and Privacy
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Cryptanalysis of Rational Multivariate Public Key Cryptosystems
This page was built for publication: Multivariate public key cryptosystems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2509132)