The following pages link to (Q4343439):
Displaying 50 items.
- On tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\) (Q326290) (← links)
- Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic (Q356715) (← links)
- Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH (Q404920) (← links)
- Extended multivariate public key cryptosystems with secure encryption function (Q415979) (← links)
- SimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryption (Q492017) (← links)
- An efficient algorithm for decomposing multivariate polynomials and its applications to cryptography (Q733509) (← links)
- On enumeration of polynomial equivalence classes and their application to MPKC (Q765801) (← links)
- The security of the birational permutation signature schemes (Q1364903) (← links)
- EFLASH: a new multivariate encryption scheme (Q1726680) (← links)
- An application of algebraic geometry to encryption: tame transformation method (Q1884054) (← links)
- Multivariate public key cryptosystems from Diophantine equations (Q1936497) (← links)
- Cryptanalysis of the extension field cancellation cryptosystem (Q2034996) (← links)
- The nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutes (Q2056690) (← links)
- A public key cryptosystem using a group of permutation polynomials (Q2057316) (← links)
- Analysis of multivariate encryption schemes: application to Dob (Q2061916) (← links)
- Security analysis via algebraic attack against ``a new encryption scheme for multivariate quadratic system'' (Q2079887) (← links)
- Cryptanalysis of the lifted unbalanced oil vinegar signature scheme (Q2102067) (← links)
- New practical multivariate signatures from a nonlinear modifier (Q2118527) (← links)
- On the effect of projection on rank attacks in multivariate cryptography (Q2118528) (← links)
- Verifying post-quantum signatures in 8 kB of RAM (Q2118545) (← links)
- Low-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2]\) (Q2139645) (← links)
- All in the \(C^*\) family (Q2182072) (← links)
- Key-recovery attacks on \(\mathsf{ASASA}\) (Q2413617) (← links)
- The implementation of cubic public keys based on a new family of algebraic graphs (Q2442946) (← links)
- On the security of biquadratic \(C^\ast\) public-key cryptosystems and its generalizations (Q2632838) (← links)
- Inverting square systems algebraically is exponential (Q2637324) (← links)
- A Multivariate Encryption Scheme with Rainbow (Q2801772) (← links)
- On Dynamical Systems of Large Girth or Cycle Indicator and Their Applications to Multivariate Cryptography (Q2866111) (← links)
- Revisiting the Cubic UOV Signature Scheme (Q2988348) (← links)
- General Fault Attacks on Multivariate Public Key Cryptosystems (Q3102780) (← links)
- On the Differential Security of Multivariate Public Key Cryptosystems (Q3102788) (← links)
- A Security Analysis of Uniformly-Layered Rainbow (Q3102798) (← links)
- Asymmetric Cryptography with a Hidden Monomial (Q3452338) (← links)
- MI-T-HFE, A New Multivariate Signature Scheme (Q3460097) (← links)
- Square-Vinegar Signature Scheme (Q3535348) (← links)
- Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems (Q3535359) (← links)
- Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects (Q3593087) (← links)
- Square, a New Multivariate Encryption Scheme (Q3623049) (← links)
- Algebraic Attacks against Random Local Functions and Their Countermeasures (Q4600698) (← links)
- (Q4638056) (← links)
- (Q4691924) (← links)
- Recent Developments in Multivariate Public Key Cryptosystems (Q4964364) (← links)
- Computational quantum key distribution (CQKD) on decentralized ledger and blockchain (Q5034980) (← links)
- Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme (Q5041227) (← links)
- Practical Cryptanalysis of k-ary $$C^*$$ (Q5041230) (← links)
- A new perturbation algorithm and enhancing security of SFLASH signature scheme (Q5046396) (← links)
- A Secure Variant of the SRP Encryption Scheme with Shorter Private Key (Q5056015) (← links)
- Quantum Cryptography: Key Distribution and Beyond (Q5134949) (← links)
- On the family of cubical multivariate cryptosystems based on the algebraic graph over finite commutative rings of characteristic 2 (Q5406682) (← links)
- Algebraic Cryptanalysis of the Data Encryption Standard (Q5447514) (← links)