Practical Cryptanalysis of SFLASH
From MaRDI portal
Publication:3612541
DOI10.1007/978-3-540-74143-5_1zbMath1215.94043OpenAlexW1525538022MaRDI QIDQ3612541
Jacques Stern, Adi Shamir, Pierre-Alain Fouque, Vivien Dubois
Publication date: 10 March 2009
Published in: Advances in Cryptology - CRYPTO 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-74143-5_1
Related Items
Practical Cryptanalysis of k-ary $$C^*$$ ⋮ A Rank Attack Against Extension Field Cancellation ⋮ A new perturbation algorithm and enhancing security of SFLASH signature scheme ⋮ On tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\) ⋮ On methods of shortening ElGamal-type signatures ⋮ All in the \(C^*\) family ⋮ Key-recovery attacks on \(\mathsf{ASASA}\) ⋮ Efficient public-key operation in multivariate schemes ⋮ An algorithm for solving over-determined multivariate quadratic systems over finite fields ⋮ From 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based Signatures ⋮ Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH ⋮ Improving support-minors rank attacks: applications to G\textit{e}MSS and Rainbow ⋮ Cryptanalysis of the TRMS Signature Scheme of PKC’05 ⋮ New Differential-Algebraic Attacks and Reparametrization of Rainbow ⋮ Extended multivariate public key cryptosystems with secure encryption function ⋮ 2F -- a new method for constructing efficient multivariate encryption schemes ⋮ Square-Vinegar Signature Scheme ⋮ Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ℓIC-Derivatives ⋮ Quantum Cryptography: Key Distribution and Beyond ⋮ Revisiting the Cubic UOV Signature Scheme ⋮ A Cryptanalysis of the Double-Round Quadratic Cryptosystem ⋮ EFLASH: a new multivariate encryption scheme ⋮ Poly-Dragon: an efficient multivariate public key cryptosystem ⋮ A multivariate cryptosystem inspired by random linear codes ⋮ Cryptanalysis of the extension field cancellation cryptosystem ⋮ A Multivariate Encryption Scheme with Rainbow ⋮ Key Recovery on Hidden Monomial Multivariate Schemes ⋮ Square, a New Multivariate Encryption Scheme ⋮ A public key cryptosystem using a group of permutation polynomials ⋮ On enumeration of polynomial equivalence classes and their application to MPKC ⋮ General Fault Attacks on Multivariate Public Key Cryptosystems ⋮ On the Differential Security of Multivariate Public Key Cryptosystems ⋮ New practical multivariate signatures from a nonlinear modifier ⋮ On the effect of projection on rank attacks in multivariate cryptography