Cryptanalysis of the TRMS Signature Scheme of PKC’05
From MaRDI portal
Publication:3506376
DOI10.1007/978-3-540-68164-9_10zbMath1142.94333OpenAlexW1543112302MaRDI QIDQ3506376
Ludovic Perret, Luk Bettale, Jean-Charles Faugère
Publication date: 13 June 2008
Published in: Progress in Cryptology – AFRICACRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-68164-9_10
Related Items (2)
Efficient public-key operation in multivariate schemes ⋮ Hybrid approach for solving multivariate systems over finite fields
Uses Software
Cites Work
- A new efficient algorithm for computing Gröbner bases \((F_4)\)
- Efficient computation of zero-dimensional Gröbner bases by change of ordering
- Multivariate subresultants using Jouanolou matrices
- Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
- Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects
- QUAD: A Practical Stream Cipher with Provable Security
- Practical Cryptanalysis of SFLASH
- A Survey on Polly Cracker Systems
- New directions in cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- Unbalanced Oil and Vinegar Signature Schemes
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Advances in Cryptology - CRYPTO 2003
- Cryptanalysis of SFLASH with Slightly Modified Parameters
- Information and Communications Security
- Comparison Between XL and Gröbner Basis Algorithms
- Public Key Cryptography - PKC 2005
- Public Key Cryptography - PKC 2005
- Cryptanalysis of 2R− Schemes
- Algebraic aspects of cryptography. With an appendix on hyperelliptic curves by Alfred J. Menezes, Yi-Hong Wu, and Robert J. Zuccherato
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Cryptanalysis of the TRMS Signature Scheme of PKC’05