A public key system with signature and master key functions
From MaRDI portal
Publication:4241652
Recommendations
Cites work
- scientific article; zbMATH DE number 3479037 (Why is no real title available?)
- A PUBLIC-KEY CRYPTOSYSTEM BASED UPON EQUATIONS OVER A FINITE FIELD
- A method for obtaining digital signatures and public-key cryptosystems
- Constructing roadmaps of semi-algebraic sets. I: Completeness
- Fast Algorithms for Manipulating Formal Power Series
- The Jacobian conjecture: Reduction of degree and formal expansion of the inverse
- The inverse of an automorphism in polynomial time
Cited in
(24)- A multivariate encryption scheme with Rainbow
- The generalization of public key cryptosystem FAPKC4
- A hybrid search algorithm for the Whitehead minimization problem.
- On the security of stepwise triangular systems
- On permutations induced by tame automorphisms over finite fields
- CRYPTANALYSIS OF AN IMPLEMENTATION SCHEME OF THE TAMED TRANSFORMATION METHOD CRYPTOSYSTEM
- Weil sum for birthday attack in multivariate quadratic cryptosystem
- Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems
- A public key cryptosystem based on the conformal iterative depth problem
- Multivariate public key cryptosystems from Diophantine equations
- On tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\)
- VDOO: a short, fast, post-quantum multivariate digital signature scheme
- Tropical Cryptography
- A SYSTEMATIC CONSTRUCTION OF A -MODULE IN TTM
- A public key cryptosystem using a group of permutation polynomials
- On dynamical systems of large girth or cycle indicator and their applications to multivariate cryptography
- Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic
- Cryptographic technology for benefiting from Big Data
- A method for obtaining digital signatures and public-key cryptosystems
- An application of algebraic geometry to encryption: tame transformation method
- MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy
- General Fault Attacks on Multivariate Public Key Cryptosystems
- Multivariate public key cryptosystem from Sidon spaces
- Cryptanalysis of the new TTS scheme in CHES 2004
This page was built for publication: A public key system with signature and master key functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4241652)