Practical Cryptanalysis of k-ary $$C^*$$
From MaRDI portal
Publication:5041230
DOI10.1007/978-3-030-44223-1_20zbMath1501.94054OpenAlexW2964809090MaRDI QIDQ5041230
Publication date: 13 October 2022
Published in: Post-Quantum Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-44223-1_20
Related Items (2)
2F -- a new method for constructing efficient multivariate encryption schemes ⋮ New practical multivariate signatures from a nonlinear modifier
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Post-quantum cryptography. 6th international workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1--3, 2014. Proceedings
- The Magma algebra system. I: The user language
- Rank analysis of cubic multivariate cryptosystems
- Key recovery attack for ZHFE
- Key recovery attack on the cubic ABC Simple Matrix Multivariate Encryption Scheme
- On the security of biquadratic \(C^\ast\) public-key cryptosystems and its generalizations
- Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
- The Cubic Simple Matrix Encryption Scheme
- ZHFE, a New Multivariate Public Key Encryption Scheme
- On the Differential Security of Multivariate Public Key Cryptosystems
- Properties of the Discrete Differential with Cryptographic Applications
- Practical Cryptanalysis of SFLASH
- Unbalanced Oil and Vinegar Signature Schemes
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Advances in Cryptology - CRYPTO 2003
- Public Key Cryptography – PKC 2004
This page was built for publication: Practical Cryptanalysis of k-ary $$C^*$$