<--- Back to Details
First PageDocument Content
Cryptography / Multivariate cryptography / Post-quantum cryptography / Algebra / Polynomials / Unbalanced Oil and Vinegar / Hidden Field Equations / Algebraic equation / QUAD / Variable / Equation / Finite field
Date: 2013-03-31 09:28:56
Cryptography
Multivariate cryptography
Post-quantum cryptography
Algebra
Polynomials
Unbalanced Oil and Vinegar
Hidden Field Equations
Algebraic equation
QUAD
Variable
Equation
Finite field

Multivariate Cryptography Louis Goubin, Versailles St-Quentin-en-Yvelines University, France, Jacques Patarin, Versailles St-Quentin-en-Yvelines University, France, and Bo-Yin Yang, Institute of Information Science, Acad

Add to Reading List

Source URL: precision.moscito.org

Download Document from Source Website

File Size: 218,87 KB

Share Document on Facebook

Similar Documents

MQ Challenge: Hardness Evaluation of Solving MQ problems

MQ Challenge: Hardness Evaluation of Solving MQ problems

DocID: 18rai - View Document

PDF Document

DocID: 17s8a - View Document

Superfluous Keys in Multivariate Quadratic Asymmetric Systems Christopher Wolf and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {Christopher.Wolf,Bart.Preneel}@esat.kuleuven

Superfluous Keys in Multivariate Quadratic Asymmetric Systems Christopher Wolf and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {Christopher.Wolf,Bart.Preneel}@esat.kuleuven

DocID: 138MO - View Document

Equivalent Keys in Multivariate Quadratic Public Key Systems Christopher Wolf1,2 , and Bart Preneel1 1 K.U.Leuven, ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium

Equivalent Keys in Multivariate Quadratic Public Key Systems Christopher Wolf1,2 , and Bart Preneel1 1 K.U.Leuven, ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium

DocID: 130HO - View Document

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog

DocID: 12Hys - View Document