scientific article; zbMATH DE number 1418284

From MaRDI portal
Publication:4941844

zbMath0940.94012MaRDI QIDQ4941844

Adi Shamir, Aviad Kipnis

Publication date: 19 March 2000


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (78)

Efficient key recovery for all HFE signature variantsOn multivariable encryption schemes based on simultaneous algebraic Riccati equations over finite fieldsGeneralization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key EncryptionPractical Cryptanalysis of k-ary $$C^*$$A Rank Attack Against Extension Field CancellationPublic key cryptography based on ergodic matrices over finite fieldAlgebraic key-recovery attacks on reduced-round XoofffBoolean ring cryptographic equation solving\#P-completeness of counting roots of a sparse polynomialSemi-Regular Sequences and Other Random Systems of EquationsThe Complexity of MinRankOn the security of biquadratic \(C^\ast\) public-key cryptosystems and its generalizationsInverting square systems algebraically is exponentialMI-T-HFE, A New Multivariate Signature SchemeOn tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\)On enumeration of polynomial equivalence classesCryptanalysis of HFE, multi-HFE and variants for odd and even characteristicPractical post-quantum signature schemes from isomorphism problems of trilinear formsAll in the \(C^*\) familyOn the complexity of the generalized MinRank problemEnhanced matrix power function for cryptographic primitive constructionEfficient public-key operation in multivariate schemesOn the geometry of balls in the Grassmannian and list decoding of lifted Gabidulin codesRevisiting algebraic attacks on MinRank and on the rank decoding problemAn algorithm for solving over-determined multivariate quadratic systems over finite fieldsRefined F5 Algorithms for Ideals of Minors of Square MatricesBreaking rainbow takes a weekend on a laptopImproving support-minors rank attacks: applications to G\textit{e}MSS and RainbowImprovement of algebraic attacks for solving superdetermined MinRank instancesMinRank in the head. Short signatures from zero-knowledge proofsTake your MEDS: digital signatures from matrix code equivalenceCryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}On the complexity of solving generic overdetermined bilinear systemsMR-DSS -- smaller MinRank-based (ring-)signaturesIPRainbow2F -- a new method for constructing efficient multivariate encryption schemesAlgebraic relation of three MinRank algebraic modelingsOn the equivalence of two post-quantum cryptographic familiesImprovements of algebraic attacks for solving the rank decoding and MinRank problemsSquare-Vinegar Signature SchemeNonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key CryptosystemsPSP: parallel sub-pipelined architecture for high throughput AES on FPGA and ASICEFLASH: a new multivariate encryption schemeParallelization of matrix algorithms for Gröbner basis computationComputing the multilinear factors of lacunary polynomials without heightsSolving multivariate polynomial systems and an invariant from commutative algebraSimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryptionAlgebraic Attacks on the Courtois Toy CipherTotal break of the SRP encryption schemeRevisiting the Efficient Key Generation of ZHFEKipnis-Shamir Attack on HFE RevisitedOn the Number of Linearly Independent Equations Generated by XLCryptanalysis of the extension field cancellation cryptosystemA Multivariate Encryption Scheme with RainbowA new encryption scheme for multivariate quadratic systemsNew Description of SMS4 by an Embedding overGF(28)A Variant of the F4 AlgorithmCryptanalysis of Riccati equation encryption schemes TP-I and TP-IISquare, a New Multivariate Encryption SchemeAn improved signature model of multivariate polynomial public key cryptosystem against key recovery attackRecent Developments in Multivariate Public Key CryptosystemsSmashing SQUASH-0Sublinear Root Detection and New Hardness Results for Sparse Polynomials over Finite FieldsAn algebraic attack on rank metric code-based cryptosystemsImproved cryptanalysis of UOV and RainbowA public key cryptosystem using a group of permutation polynomialsMultivariate public key cryptosystem from Sidon spacesOn enumeration of polynomial equivalence classes and their application to MPKCGeneral Fault Attacks on Multivariate Public Key CryptosystemsOn Provable Security of UOV and HFE Signature Schemes against Chosen-Message AttackRoots of Square: Cryptanalysis of Double-Layer Square and Square+Fast computation of a rational point of a variety over a finite fieldHigh-rank attack on HMFEvChosen ciphertext attack on ZHFEUnnamed ItemOn Dynamical Systems of Large Girth or Cycle Indicator and Their Applications to Multivariate CryptographyThe Complexity of Public-Key CryptographyNew practical multivariate signatures from a nonlinear modifier




This page was built for publication: