Cryptanalysis of Riccati equation encryption schemes TP-I and TP-II
DOI10.1016/j.ffa.2018.07.004zbMath1401.94175OpenAlexW2884715805WikidataQ121063534 ScholiaQ121063534MaRDI QIDQ1800692
Lih-Chung Wang, Jian-Ming Shih, Yossi (Joseph) Peretz
Publication date: 24 October 2018
Published in: Finite Fields and their Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ffa.2018.07.004
algebraic Riccati equationspublic-key encryption schemesTP-I (Tsafenat-Paaneah-I)TP-II (Tsafenat-Paaneah-II)
Cryptography (94A60) Finite fields (field-theoretic aspects) (12E20) Complexity of computation (including implicit computational complexity) (03D15) Computational difficulty of problems (lower bounds, completeness, difficulty of approximation, etc.) (68Q17) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On multivariable encryption schemes based on simultaneous algebraic Riccati equations over finite fields
- Post-Quantum Cryptography
- Multivariate Public Key Cryptography
- Overview of Cryptanalysis Techniques in Multivariate Public Key Cryptography
- Simple Matrix Scheme for Encryption
- Advanced Encryption Standard – AES
- Public Key Cryptography - PKC 2005
- Public Key Cryptography - PKC 2005
- Topics in Cryptology – CT-RSA 2006
This page was built for publication: Cryptanalysis of Riccati equation encryption schemes TP-I and TP-II