<--- Back to Details
First PageDocument Content
Cryptography / Post-quantum cryptography / Multivariate cryptography / Finite fields / Lattice-based cryptography / Hidden Field Equations / Learning with errors / QUAD / RSA / Reduction / Computational hardness assumption / Ideal lattice cryptography
Date: 2012-04-04 23:26:12
Cryptography
Post-quantum cryptography
Multivariate cryptography
Finite fields
Lattice-based cryptography
Hidden Field Equations
Learning with errors
QUAD
RSA
Reduction
Computational hardness assumption
Ideal lattice cryptography

Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3

Add to Reading List

Source URL: precision.moscito.org

Download Document from Source Website

File Size: 261,61 KB

Share Document on Facebook

Similar Documents

On the mathematical structure and hidden symmetries of the Born-Infeld field equations Diego Julio Cirilo-Lombardo JINR University, Russian federation

On the mathematical structure and hidden symmetries of the Born-Infeld field equations Diego Julio Cirilo-Lombardo JINR University, Russian federation

DocID: 1q3Tb - View Document

Introduction  The MQ Problem Polynomial Equivalence Problems

Introduction The MQ Problem Polynomial Equivalence Problems

DocID: 1nx18 - View Document

MQ Challenge: Hardness Evaluation of Solving MQ problems

MQ Challenge: Hardness Evaluation of Solving MQ problems

DocID: 18rai - View Document

Public-Key Cryptography from Different Assumptions Benny Applebaum∗ Boaz Barak†  Avi Wigderson‡

Public-Key Cryptography from Different Assumptions Benny Applebaum∗ Boaz Barak† Avi Wigderson‡

DocID: 18odj - View Document

PDF Document

DocID: 17s8a - View Document