Unbalanced Oil and Vinegar Signature Schemes

From MaRDI portal
Publication:4250763


DOI10.1007/3-540-48910-X_15zbMath0933.94031MaRDI QIDQ4250763

Louis Goubin, Aviad Kipnis, Jacques Patarin

Publication date: 6 April 2000

Published in: Advances in Cryptology — EUROCRYPT ’99 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-48910-x_15


94A60: Cryptography


Related Items

Unnamed Item, Unnamed Item, Unnamed Item, Recent Developments in Multivariate Public Key Cryptosystems, RingRainbow – An Efficient Multivariate Ring Signature Scheme, MQ Aggregate Signature Schemes with Exact Security Based on UOV Signature, Efficient Key Generation for Rainbow, Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme, A Structural Attack on Block-Anti-Circulant UOV at SAC 2019, Practical Cryptanalysis of k-ary $$C^*$$, A Rank Attack Against Extension Field Cancellation, A new perturbation algorithm and enhancing security of SFLASH signature scheme, Key recovery attack on Hufu-UOV, A Secure Variant of the SRP Encryption Scheme with Shorter Private Key, On methods of shortening ElGamal-type signatures, Key recovery attack on Circulant UOV/Rainbow, New multivariate-based certificateless hybrid signcryption scheme for multi-recipient, A multivariate quadratic challenge toward post-quantum generation cryptography, Cryptanalysis of the new TTS scheme in CHES 2004, Revisiting the Efficient Key Generation of ZHFE, A Practical Multivariate Blind Signature Scheme, A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV, Homomorphic polynomial public key encapsulation over two hidden rings for quantum-safe key encapsulation, Implicit white-box implementations: white-boxing ARX ciphers, An estimator for the hardness of the MQ problem, Recovering Rainbow's secret key with a first-order fault attack, Breaking rainbow takes a weekend on a laptop, Partial key exposure attacks on BIKE, Rainbow and NTRU, Puncturable signature: a generic construction and instantiations, Delegating signing rights in a multivariate proxy signature scheme, Identity-based signature and extended forking algorithm in the multivariate quadratic setting, A new fault attack on UOV multivariate signature scheme, IPRainbow, 2F -- a new method for constructing efficient multivariate encryption schemes, Algebraic relation of three MinRank algebraic modelings, Efficient IBS from a new assumption in the multivariate-quadratic setting, Revisiting the security of salted UOV signature, Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic, SimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryption, QUAD: A multivariate stream cipher with provable security, On enumeration of polynomial equivalence classes and their application to MPKC, Post-quantum secure inner product functional encryption using multivariate public key cryptography, A scalable post-quantum hash-based group signature, A security analysis of uniformly-layered Rainbow defined over non-commutative rings, Cryptanalysis of matrix-based UOV, Key recovery attack on the cubic ABC Simple Matrix Multivariate Encryption Scheme, Public key compression for constrained linear signature schemes, Total break of the SRP encryption scheme, Multivariate public key cryptosystems from Diophantine equations, A multivariate cryptosystem inspired by random linear codes, The singularity attack to the multivariate signature scheme HIMQ-3, Cryptanalysis of the extension field cancellation cryptosystem, An improved signature model of multivariate polynomial public key cryptosystem against key recovery attack, The nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutes, Improved cryptanalysis of UOV and Rainbow, Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\), A public key cryptosystem using a group of permutation polynomials, Multivariate public key cryptosystem from Sidon spaces, Practical complexities of probabilistic algorithms for solving Boolean polynomial systems, Security analysis via algebraic attack against ``a new encryption scheme for multivariate quadratic system, A study on randomness used in signature generation of UOV, A new identity-based multivariate signature scheme, A new post-quantum multivariate polynomial public key encapsulation algorithm, Security comparisons and performance analyses of post-quantum signature algorithms, Improving Thomae-Wolf algorithm for solving underdetermined multivariate quadratic polynomial problem, New practical multivariate signatures from a nonlinear modifier, Differential power analysis of the Picnic signature scheme, Verifying post-quantum signatures in 8 kB of RAM, (Short paper) Simple matrix signature scheme, A new encryption scheme for multivariate quadratic systems, On enumeration of polynomial equivalence classes, Cryptanalysis of RGB, a mixed multivariate signature scheme, Efficient public-key operation in multivariate schemes, New complexity estimation on the rainbow-band-separation attack, On the equivalence of two post-quantum cryptographic families, A Multivariate Encryption Scheme with Rainbow, Post-Quantum Cryptography: State of the Art, Hybrid MQ Signature for Embedded Device, Reducing the Key Size of Rainbow Using Non-commutative Rings, Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme, From 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based Signatures, Revisiting the Cubic UOV Signature Scheme, A Variant of the F4 Algorithm, General Fault Attacks on Multivariate Public Key Cryptosystems, On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack, On the Differential Security of Multivariate Public Key Cryptosystems, A Security Analysis of Uniformly-Layered Rainbow, Blending FHE-NTRU Keys – The Excalibur Property, The Shortest Signatures Ever, Evaluation of Solving Time for Multivariate Quadratic Equation System Using XL Algorithm Over Small Finite Fields on GPU, MI-T-HFE, A New Multivariate Signature Scheme, Cryptanalysis of the TRMS Signature Scheme of PKC’05, New Differential-Algebraic Attacks and Reparametrization of Rainbow, Square-Vinegar Signature Scheme, Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ℓIC-Derivatives, Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems