Post-quantum cryptography

Results: 155



#Item
81Equivalent Keys in Multivariate Quadratic Public Key Systems Christopher Wolf1,2 , and Bart Preneel1 1 K.U.Leuven, ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium

Equivalent Keys in Multivariate Quadratic Public Key Systems Christopher Wolf1,2 , and Bart Preneel1 1 K.U.Leuven, ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-22 06:53:55
82MULTIVARIABLE PUBLIC–KEY CRYPTOSYSTEMS JINTAI DING, DIETER SCHMIDT Keywords: public-key, multivariable polynomials 1. Introduction Recently Landau and Diffie gave in a series of articles in the Notices of

MULTIVARIABLE PUBLIC–KEY CRYPTOSYSTEMS JINTAI DING, DIETER SCHMIDT Keywords: public-key, multivariable polynomials 1. Introduction Recently Landau and Diffie gave in a series of articles in the Notices of

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-09 16:39:00
83Solutions to Key Exposure Problem in Ring Signature Joseph K. Liu1 , and Duncan S. Wong2 1  Department of Computer Science

Solutions to Key Exposure Problem in Ring Signature Joseph K. Liu1 , and Duncan S. Wong2 1 Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-23 05:46:43
84A New Class of Multivariate Public Key Cryptosystem Constructed on the Basis of Message-Dependent Transformation Masao KASAHARA Faculty of Informatics, Osaka Gakuin University, Suita-shi, Japan. .

A New Class of Multivariate Public Key Cryptosystem Constructed on the Basis of Message-Dependent Transformation Masao KASAHARA Faculty of Informatics, Osaka Gakuin University, Suita-shi, Japan. .

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-20 02:54:57
85Timing Attacks against the Syndrome Inversion in Code-based Cryptosystems Falko Strenzke 1  2

Timing Attacks against the Syndrome Inversion in Code-based Cryptosystems Falko Strenzke 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-07 10:49:20
861  DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen and Jose Luis

1 DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen and Jose Luis

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-18 07:49:31
87Fast and Secure Root Finding for Code-based Cryptosystems Falko Strenzke 1  2

Fast and Secure Root Finding for Code-based Cryptosystems Falko Strenzke 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-07 11:04:10
88A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery) Charles Bouillaguet1 , Pierre-Alain Fouque1 , Antoine Joux2,3 , and Joana Treger2 1 Ecole Normale Supérieure

A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery) Charles Bouillaguet1 , Pierre-Alain Fouque1 , Antoine Joux2,3 , and Joana Treger2 1 Ecole Normale Supérieure

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-15 10:42:41
89MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-30 04:23:42
90非可換性を利用した多変数多項式電子署名

非可換性を利用した多変数多項式電子署名

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:32:25