Pages that link to "Item:Q2876885"
From MaRDI portal
The following pages link to Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms (Q2876885):
Displaying 50 items.
- On tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\) (Q326290) (← links)
- Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic (Q356715) (← links)
- Permutation polynomials over finite fields involving \(x+x^q+\cdots +x^{q^{a-1}}\) (Q393188) (← links)
- First fall degree and Weil descent (Q405966) (← links)
- Characteristic set algorithms for equation solving in finite fields (Q413410) (← links)
- On the relation between the MXL family of algorithms and Gröbner basis algorithms (Q414624) (← links)
- Extended multivariate public key cryptosystems with secure encryption function (Q415979) (← links)
- A general construction for monoid-based knapsack protocols (Q476358) (← links)
- SimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryption (Q492017) (← links)
- When does \(G(x)+\gamma \, \text{Tr}(H(x))\) permute \(\mathbb F_{p^n}\)? (Q623241) (← links)
- QUAD: A multivariate stream cipher with provable security (Q733512) (← links)
- On enumeration of polynomial equivalence classes and their application to MPKC (Q765801) (← links)
- Why you cannot even hope to use Gröbner bases in cryptography: an eternal golden braid of failures (Q780363) (← links)
- Stronger bounds on the cost of computing Gröbner bases for HFE systems (Q820971) (← links)
- Post-quantum secure inner product functional encryption using multivariate public key cryptography (Q821514) (← links)
- Boolean ring cryptographic equation solving (Q832346) (← links)
- On the security of stepwise triangular systems (Q851759) (← links)
- An improved affine equivalence algorithm for random permutations (Q1648807) (← links)
- On the last fall degree of zero-dimensional Weil descent systems (Q1690789) (← links)
- EFLASH: a new multivariate encryption scheme (Q1726680) (← links)
- Public key compression for constrained linear signature schemes (Q1726681) (← links)
- A public-key encryption scheme based on non-linear indeterminate equations (Q1746969) (← links)
- An application of algebraic geometry to encryption: tame transformation method (Q1884054) (← links)
- The degree of regularity of a quadratic polynomial (Q1946161) (← links)
- A multivariate cryptosystem inspired by random linear codes (Q1995213) (← links)
- Dembowski-Ostrom polynomials and reversed Dickson polynomials (Q2028084) (← links)
- Cryptanalysis of the extension field cancellation cryptosystem (Q2034996) (← links)
- An improved signature model of multivariate polynomial public key cryptosystem against key recovery attack (Q2045564) (← links)
- Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\) (Q2056692) (← links)
- A public key cryptosystem using a group of permutation polynomials (Q2057316) (← links)
- Analysis of multivariate encryption schemes: application to Dob (Q2061916) (← links)
- Multivariate public key cryptosystem from Sidon spaces (Q2061921) (← links)
- Practical complexities of probabilistic algorithms for solving Boolean polynomial systems (Q2065761) (← links)
- Security analysis via algebraic attack against ``a new encryption scheme for multivariate quadratic system'' (Q2079887) (← links)
- A new post-quantum multivariate polynomial public key encapsulation algorithm (Q2102772) (← links)
- On the effect of projection on rank attacks in multivariate cryptography (Q2118528) (← links)
- Verifying post-quantum signatures in 8 kB of RAM (Q2118545) (← links)
- Efficient key recovery for all HFE signature variants (Q2120067) (← links)
- Solving the problem of blockwise isomorphism of polynomials with circulant matrices (Q2128752) (← links)
- (Short paper) Simple matrix signature scheme (Q2128761) (← links)
- Security analysis on an ElGamal-like multivariate encryption scheme based on isomorphism of polynomials (Q2151302) (← links)
- Practical post-quantum signature schemes from isomorphism problems of trilinear forms (Q2170103) (← links)
- General linear group action on tensors: a candidate for post-quantum cryptography (Q2175914) (← links)
- Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem (Q2188960) (← links)
- A new encryption scheme for multivariate quadratic systems (Q2290641) (← links)
- Determining whether a given cryptographic function is a permutation of another given cryptographic function -- a problem in intellectual property (Q2333818) (← links)
- Polynomial-time algorithms for quadratic isomorphism of polynomials: the regular case (Q2349096) (← links)
- On enumeration of polynomial equivalence classes (Q2392938) (← links)
- Cryptanalysis of RGB, a mixed multivariate signature scheme (Q2396771) (← links)
- Key-recovery attacks on \(\mathsf{ASASA}\) (Q2413617) (← links)