On the security of stepwise triangular systems
DOI10.1007/S10623-006-0015-5zbMATH Open1210.94094DBLPjournals/dcc/WolfBP06OpenAlexW1978927998WikidataQ62045620 ScholiaQ62045620MaRDI QIDQ851759FDOQ851759
Authors: An Braeken, Bart Preneel, Christopher A. Wolf
Publication date: 22 November 2006
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-813.pdf
Recommendations
- A secure three-party computational protocol for triangle area
- Identifying flaws in the security of critical sets in Latin squares via triangulations
- On the security of a realization of the cryptosystem \(\text{MST}_3\)
- scientific article; zbMATH DE number 2202215
- Security in Sierpiński graphs
- On the security of a public-key cryptosystem
- On the security of \textsf{TrCBC}
- Security invariants in discrete transition systems
Analysis of algorithms and problem complexity (68Q25) Analysis of algorithms (68W40) Cryptography (94A60) Computational aspects in algebraic geometry (14Q99) Arithmetic theory of polynomial rings over finite fields (11T55) Enumerative problems (combinatorial problems) in algebraic geometry (14N10) Other finite linear geometries (51E26) Field extensions (12F99)
Cites Work
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Hidden fields equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms
- A public key system with signature and master key functions
- Progress in Cryptology – Mycrypt 2005
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- The security of the birational permutation signature schemes
- Security in Communication Networks
Cited In (9)
- A rank attack against extension field cancellation
- Roots of Square: cryptanalysis of double-layer Square and Square+
- A Secure Variant of the SRP Encryption Scheme with Shorter Private Key
- Implicit white-box implementations: white-boxing ARX ciphers
- VDOO: a short, fast, post-quantum multivariate digital signature scheme
- A new encryption scheme for multivariate quadratic systems
- Cryptanalysis of enhanced TTS, STS and all its variants, or: why cross-terms are important
- Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme
- Proposal of a signature scheme based on STS trapdoor
Uses Software
This page was built for publication: On the security of stepwise triangular systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q851759)