Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms

From MaRDI portal
Publication:2876885


DOI10.1007/3-540-68339-9_4zbMath1301.94125MaRDI QIDQ2876885

Jacques Patarin

Publication date: 20 August 2014

Published in: Advances in Cryptology — EUROCRYPT ’96 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-68339-9_4


11T71: Algebraic coding theory; cryptography (number-theoretic aspects)

94A60: Cryptography

94A62: Authentication, digital signatures and secret sharing


Related Items

Unnamed Item, Quantum Cryptography: Key Distribution and Beyond, New multivariate-based certificateless hybrid signcryption scheme for multi-recipient, Analysis of Multivariate Hash Functions, A Note on a Class of Quadratic Permutations over ${\mathbb F}_{{2^n}}$, Weil sum for birthday attack in multivariate quadratic cryptosystem, Key Recovery on Hidden Monomial Multivariate Schemes, Cryptanalysis of the new TTS scheme in CHES 2004, Revisiting the Efficient Key Generation of ZHFE, On the Complexity of Isomorphism Problems for Tensors, Groups, and Polynomials I: Tensor Isomorphism-Completeness, Homomorphic polynomial public key encapsulation over two hidden rings for quantum-safe key encapsulation, Refined F5 Algorithms for Ideals of Minors of Square Matrices, Implicit white-box implementations: white-boxing ARX ciphers, Improving support-minors rank attacks: applications to G\textit{e}MSS and Rainbow, Improvement of algebraic attacks for solving superdetermined MinRank instances, Delegating signing rights in a multivariate proxy signature scheme, 2F -- a new method for constructing efficient multivariate encryption schemes, Algebraic relation of three MinRank algebraic modelings, Algorithms Based on *-Algebras, and Their Applications to Isomorphism of Polynomials with One Secret, Group Isomorphism, and Polynomial Identity Testing, Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs, Unnamed Item, Unnamed Item, Recent Developments in Multivariate Public Key Cryptosystems, The Complexity of Public-Key Cryptography, Computational quantum key distribution (CQKD) on decentralized ledger and blockchain, Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme, Generalization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key Encryption, Practical Cryptanalysis of k-ary $$C^*$$, A Rank Attack Against Extension Field Cancellation, Multivariate Encryption Schemes Based on Polynomial Equations over Real Numbers, A new perturbation algorithm and enhancing security of SFLASH signature scheme, New Ideas to Build Noise-Free Homomorphic Cryptosystems, A Secure Variant of the SRP Encryption Scheme with Shorter Private Key, Determinant Equivalence Test over Finite Fields and over Q, On tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\), Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic, Permutation polynomials over finite fields involving \(x+x^q+\cdots +x^{q^{a-1}}\), First fall degree and Weil descent, Characteristic set algorithms for equation solving in finite fields, On the relation between the MXL family of algorithms and Gröbner basis algorithms, Extended multivariate public key cryptosystems with secure encryption function, A general construction for monoid-based knapsack protocols, SimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryption, When does \(G(x)+\gamma \, \text{Tr}(H(x))\) permute \(\mathbb F_{p^n}\)?, QUAD: A multivariate stream cipher with provable security, On enumeration of polynomial equivalence classes and their application to MPKC, Why you cannot even hope to use Gröbner bases in cryptography: an eternal golden braid of failures, Stronger bounds on the cost of computing Gröbner bases for HFE systems, Post-quantum secure inner product functional encryption using multivariate public key cryptography, Boolean ring cryptographic equation solving, On the security of stepwise triangular systems, An improved affine equivalence algorithm for random permutations, On the last fall degree of zero-dimensional Weil descent systems, EFLASH: a new multivariate encryption scheme, Public key compression for constrained linear signature schemes, A public-key encryption scheme based on non-linear indeterminate equations, An application of algebraic geometry to encryption: tame transformation method, The degree of regularity of a quadratic polynomial, A multivariate cryptosystem inspired by random linear codes, Dembowski-Ostrom polynomials and reversed Dickson polynomials, Cryptanalysis of the extension field cancellation cryptosystem, An improved signature model of multivariate polynomial public key cryptosystem against key recovery attack, Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\), A public key cryptosystem using a group of permutation polynomials, Analysis of multivariate encryption schemes: application to Dob, Multivariate public key cryptosystem from Sidon spaces, Practical complexities of probabilistic algorithms for solving Boolean polynomial systems, Security analysis via algebraic attack against ``a new encryption scheme for multivariate quadratic system, A new post-quantum multivariate polynomial public key encapsulation algorithm, On the effect of projection on rank attacks in multivariate cryptography, Verifying post-quantum signatures in 8 kB of RAM, Efficient key recovery for all HFE signature variants, Solving the problem of blockwise isomorphism of polynomials with circulant matrices, (Short paper) Simple matrix signature scheme, Security analysis on an ElGamal-like multivariate encryption scheme based on isomorphism of polynomials, Practical post-quantum signature schemes from isomorphism problems of trilinear forms, General linear group action on tensors: a candidate for post-quantum cryptography, Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem, A new encryption scheme for multivariate quadratic systems, Determining whether a given cryptographic function is a permutation of another given cryptographic function -- a problem in intellectual property, Polynomial-time algorithms for quadratic isomorphism of polynomials: the regular case, On enumeration of polynomial equivalence classes, Cryptanalysis of RGB, a mixed multivariate signature scheme, Key-recovery attacks on \(\mathsf{ASASA}\), Enhanced matrix power function for cryptographic primitive construction, Efficient public-key operation in multivariate schemes, Dembowski-Ostrom polynomials from reversed Dickson polynomials, Towards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\), New complexity estimation on the rainbow-band-separation attack, Isomorphism testing of read-once functions and polynomials, On the equivalence of two post-quantum cryptographic families, The complexity of solving Weil restriction systems, Improvements of algebraic attacks for solving the rank decoding and MinRank problems, A Multivariate Encryption Scheme with Rainbow, Hybrid MQ Signature for Embedded Device, Efficient Algorithms for Supersingular Isogeny Diffie-Hellman, On Dynamical Systems of Large Girth or Cycle Indicator and Their Applications to Multivariate Cryptography, Cryptanalysis of a public key cryptosystem based on boolean permutations, Computing border bases using mutant strategies, From 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based Signatures, Revisiting the Cubic UOV Signature Scheme, Poly-Dragon: an efficient multivariate public key cryptosystem, General Fault Attacks on Multivariate Public Key Cryptosystems, On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack, Roots of Square: Cryptanalysis of Double-Layer Square and Square+, Chosen ciphertext attack on ZHFE, The Shortest Signatures Ever, Evaluation of Solving Time for Multivariate Quadratic Equation System Using XL Algorithm Over Small Finite Fields on GPU, Asymmetric Cryptography with a Hidden Monomial, Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP, MI-T-HFE, A New Multivariate Signature Scheme, Cryptanalysis of the TRMS Signature Scheme of PKC’05, Square-Vinegar Signature Scheme, Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems, MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy, Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects, Kipnis-Shamir Attack on HFE Revisited, Square, a New Multivariate Encryption Scheme