Taxonomy of Public Key Schemes Based on the Problem of Multivariate Quadratic Equations (2005)

Cached

Download Links

by Christopher Wolf , Bart Preneel
Citations:29 - 3 self

Active Bibliography

11 Objects as Mobile Processes – Hans Hüttel, Josva Kleist - 1996
18 Optimal Purely Functional Priority Queues – Gerth Stølting Brodal, Chris Okasaki - 1996
Equivalent Keys in – Public Key Systems, Christopher Wolf, Bart Preneel - 2005
1 Applications of Multivariate Quadratic Public Key Systems – Christopher Wolf, Bart Preneel - 2004
unknown title – Charles Bouillaguet, Pierre-alain Fouque, Antoine Joux, Joana Treger, Université De Versailles-saint Quentin
5 Equivalent Keys in HFE, C*, and Variations – Christopher Wolf, Bart Preneel - 2005
finite fields – Luk Bettale Jean-charles Faugère
8 Efficient Public Key Generation for Multivariate Cryptosystems – Christopher Wolf - 2003
3 A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery) – Charles Bouillaguet, Pierre-Alain Fouque, Antoine Joux, Joana Treger
9 Cryptanalysis of rainbow – Olivier Billet, Henri Gilbert
5 On the security of UOV – Jean-charles Faugère, Ludovic Perret
4 Multivariate public key cryptography – Jintai Ding, Bo-yin Yang - 2009
21 Hybrid approach for solving multivariate systems over finite fields – Luk Bettale, Jean-charles Faugère, Ludovic Perret - 2009
2 Algebraic Cryptanalysis of MQQ Public Key Cryptosystem – Mohamed Saied, Emam Mohamed, Jintai Ding, Johannes Buchmann
Algebraic Attack on the MQQ Public Key – Mohamed Saied, Emam Mohamed, Jintai Ding, Johannes Buchmann, Fabian Werner
Abstract FPGA-Based Hyperelliptic Curve Cryptosystems ∗ – unknown authors
Design, Analysis, and FPGA prototyping of High-Performance Arithmetic for Cryptographic Applications Literature Review- Part 1: Cryptographic Algorithms – Mostafa Abd-el-barr, Alaaeldin Amin, Turki F. Al-somani
Security Framework for P2P Based Grid Systems – Ellahi T. N, Hudzia B, Mcdermott L, Kechadi T
Crypto-line – Anna M. Johnston, Basic Cryptography