Publication:4941844

From MaRDI portal


zbMath0940.94012MaRDI QIDQ4941844

Adi Shamir, Aviad Kipnis

Publication date: 19 March 2000



94A60: Cryptography


Related Items

Unnamed Item, Recent Developments in Multivariate Public Key Cryptosystems, The Complexity of Public-Key Cryptography, Generalization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key Encryption, Practical Cryptanalysis of k-ary $$C^*$$, A Rank Attack Against Extension Field Cancellation, Semi-Regular Sequences and Other Random Systems of Equations, The Complexity of MinRank, New Description of SMS4 by an Embedding overGF(28), Revisiting the Efficient Key Generation of ZHFE, Revisiting algebraic attacks on MinRank and on the rank decoding problem, Refined F5 Algorithms for Ideals of Minors of Square Matrices, Breaking rainbow takes a weekend on a laptop, Improving support-minors rank attacks: applications to G\textit{e}MSS and Rainbow, Improvement of algebraic attacks for solving superdetermined MinRank instances, On the complexity of solving generic overdetermined bilinear systems, MR-DSS -- smaller MinRank-based (ring-)signatures, IPRainbow, 2F -- a new method for constructing efficient multivariate encryption schemes, Algebraic relation of three MinRank algebraic modelings, On multivariable encryption schemes based on simultaneous algebraic Riccati equations over finite fields, On tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\), Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic, On the complexity of the generalized MinRank problem, On the geometry of balls in the Grassmannian and list decoding of lifted Gabidulin codes, PSP: parallel sub-pipelined architecture for high throughput AES on FPGA and ASIC, SimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryption, On enumeration of polynomial equivalence classes and their application to MPKC, Algebraic key-recovery attacks on reduced-round Xoofff, Boolean ring cryptographic equation solving, \#P-completeness of counting roots of a sparse polynomial, EFLASH: a new multivariate encryption scheme, Total break of the SRP encryption scheme, Cryptanalysis of Riccati equation encryption schemes TP-I and TP-II, Cryptanalysis of the extension field cancellation cryptosystem, An improved signature model of multivariate polynomial public key cryptosystem against key recovery attack, An algebraic attack on rank metric code-based cryptosystems, Improved cryptanalysis of UOV and Rainbow, A public key cryptosystem using a group of permutation polynomials, Multivariate public key cryptosystem from Sidon spaces, New practical multivariate signatures from a nonlinear modifier, Efficient key recovery for all HFE signature variants, Practical post-quantum signature schemes from isomorphism problems of trilinear forms, All in the \(C^*\) family, Computing the multilinear factors of lacunary polynomials without heights, Solving multivariate polynomial systems and an invariant from commutative algebra, A new encryption scheme for multivariate quadratic systems, On enumeration of polynomial equivalence classes, Enhanced matrix power function for cryptographic primitive construction, Efficient public-key operation in multivariate schemes, Parallelization of matrix algorithms for Gröbner basis computation, On the security of biquadratic \(C^\ast\) public-key cryptosystems and its generalizations, Inverting square systems algebraically is exponential, On the equivalence of two post-quantum cryptographic families, Improvements of algebraic attacks for solving the rank decoding and MinRank problems, A Multivariate Encryption Scheme with Rainbow, Sublinear Root Detection and New Hardness Results for Sparse Polynomials over Finite Fields, On Dynamical Systems of Large Girth or Cycle Indicator and Their Applications to Multivariate Cryptography, Algebraic Attacks on the Courtois Toy Cipher, A Variant of the F4 Algorithm, General Fault Attacks on Multivariate Public Key Cryptosystems, On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack, Roots of Square: Cryptanalysis of Double-Layer Square and Square+, High-rank attack on HMFEv, Chosen ciphertext attack on ZHFE, Fast computation of a rational point of a variety over a finite field, Public key cryptography based on ergodic matrices over finite field, MI-T-HFE, A New Multivariate Signature Scheme, Square-Vinegar Signature Scheme, Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems, Kipnis-Shamir Attack on HFE Revisited, On the Number of Linearly Independent Equations Generated by XL, Square, a New Multivariate Encryption Scheme, Smashing SQUASH-0