Unbalanced Oil and Vinegar Signature Schemes

From MaRDI portal
Publication:4250763

DOI10.1007/3-540-48910-X_15zbMath0933.94031OpenAlexW1628272610MaRDI QIDQ4250763

Louis Goubin, Aviad Kipnis, Jacques Patarin

Publication date: 6 April 2000

Published in: Advances in Cryptology — EUROCRYPT ’99 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-48910-x_15




Related Items

Post-quantum secure inner product functional encryption using multivariate public key cryptographyMQ Aggregate Signature Schemes with Exact Security Based on UOV SignatureReducing the Key Size of Rainbow Using Non-commutative RingsEfficient Key Generation for RainbowCombinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption SchemeA Structural Attack on Block-Anti-Circulant UOV at SAC 2019Practical Cryptanalysis of k-ary $$C^*$$A Rank Attack Against Extension Field Cancellation(Short paper) Simple matrix signature schemeA scalable post-quantum hash-based group signatureA new perturbation algorithm and enhancing security of SFLASH signature schemeKey recovery attack on Hufu-UOVEvaluation of Solving Time for Multivariate Quadratic Equation System Using XL Algorithm Over Small Finite Fields on GPUA Secure Variant of the SRP Encryption Scheme with Shorter Private KeyBlending FHE-NTRU Keys – The Excalibur PropertyThe Shortest Signatures EverMI-T-HFE, A New Multivariate Signature SchemeUnnamed ItemOn methods of shortening ElGamal-type signaturesOn enumeration of polynomial equivalence classesCryptanalysis of RGB, a mixed multivariate signature schemeCryptanalysis of HFE, multi-HFE and variants for odd and even characteristicNew complexity estimation on the rainbow-band-separation attackAlgebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature SchemeEfficient public-key operation in multivariate schemesA New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOVA security analysis of uniformly-layered Rainbow defined over non-commutative ringsAn algorithm for solving over-determined multivariate quadratic systems over finite fieldsFrom 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based SignaturesHomomorphic polynomial public key encapsulation over two hidden rings for quantum-safe key encapsulationMultivariate public key cryptosystems from Diophantine equationsImplicit white-box implementations: white-boxing ARX ciphersAn estimator for the hardness of the MQ problemRecovering Rainbow's secret key with a first-order fault attackBreaking rainbow takes a weekend on a laptopPartial key exposure attacks on BIKE, Rainbow and NTRUPuncturable signature: a generic construction and instantiationsDelegating signing rights in a multivariate proxy signature schemeCryptanalysis of the TRMS Signature Scheme of PKC’05New Differential-Algebraic Attacks and Reparametrization of RainbowAn improvement of algorithms to solve under-defined systems of multivariate quadratic equationsA technique to reduce memory usage of M4GB algorithmIdentity-based signature and extended forking algorithm in the multivariate quadratic settingCryptanalysis of matrix-based UOVA new fault attack on UOV multivariate signature schemeIPRainbow2F -- a new method for constructing efficient multivariate encryption schemesAlgebraic relation of three MinRank algebraic modelingsEfficient IBS from a new assumption in the multivariate-quadratic settingRevisiting the security of salted UOV signatureOn the equivalence of two post-quantum cryptographic familiesKey recovery attack on the cubic ABC Simple Matrix Multivariate Encryption SchemeSquare-Vinegar Signature SchemePractical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ℓIC-DerivativesNonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key CryptosystemsRevisiting the Cubic UOV Signature SchemePublic key compression for constrained linear signature schemesSimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryptionTotal break of the SRP encryption schemeA multivariate cryptosystem inspired by random linear codesRevisiting the Efficient Key Generation of ZHFEThe singularity attack to the multivariate signature scheme HIMQ-3Unnamed ItemCryptanalysis of the extension field cancellation cryptosystemA Multivariate Encryption Scheme with RainbowQUAD: A multivariate stream cipher with provable securityPost-Quantum Cryptography: State of the ArtA new encryption scheme for multivariate quadratic systemsA Variant of the F4 AlgorithmAn improved signature model of multivariate polynomial public key cryptosystem against key recovery attackRecent Developments in Multivariate Public Key CryptosystemsHybrid MQ Signature for Embedded DeviceThe nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutesImproved cryptanalysis of UOV and RainbowCryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)A public key cryptosystem using a group of permutation polynomialsRingRainbow – An Efficient Multivariate Ring Signature SchemeMultivariate public key cryptosystem from Sidon spacesPractical complexities of probabilistic algorithms for solving Boolean polynomial systemsOn enumeration of polynomial equivalence classes and their application to MPKCGeneral Fault Attacks on Multivariate Public Key CryptosystemsOn Provable Security of UOV and HFE Signature Schemes against Chosen-Message AttackOn the Differential Security of Multivariate Public Key CryptosystemsA Security Analysis of Uniformly-Layered RainbowKey recovery attack on Circulant UOV/RainbowCryptanalysis of the new TTS scheme in CHES 2004Security analysis via algebraic attack against ``a new encryption scheme for multivariate quadratic systemA study on randomness used in signature generation of UOVA new identity-based multivariate signature schemeA Practical Multivariate Blind Signature SchemeUnnamed ItemNew multivariate-based certificateless hybrid signcryption scheme for multi-recipientA new post-quantum multivariate polynomial public key encapsulation algorithmA multivariate quadratic challenge toward post-quantum generation cryptographySecurity comparisons and performance analyses of post-quantum signature algorithmsImproving Thomae-Wolf algorithm for solving underdetermined multivariate quadratic polynomial problemNew practical multivariate signatures from a nonlinear modifierDifferential power analysis of the Picnic signature schemeVerifying post-quantum signatures in 8 kB of RAM