<--- Back to Details
First PageDocument Content
Finite fields / Hidden Field Equations / Mathematics / Affine geometry / Affine transformation / Unbalanced Oil and Vinegar / Differential geometry / Multivariate cryptography / Frobenius group / Post-quantum cryptography / Geometry / Abstract algebra
Date: 2005-12-22 06:53:55
Finite fields
Hidden Field Equations
Mathematics
Affine geometry
Affine transformation
Unbalanced Oil and Vinegar
Differential geometry
Multivariate cryptography
Frobenius group
Post-quantum cryptography
Geometry
Abstract algebra

Equivalent Keys in Multivariate Quadratic Public Key Systems Christopher Wolf1,2 , and Bart Preneel1 1 K.U.Leuven, ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 245,08 KB

Share Document on Facebook

Similar Documents

MQ Challenge: Hardness Evaluation of Solving MQ problems

MQ Challenge: Hardness Evaluation of Solving MQ problems

DocID: 18rai - View Document

PDF Document

DocID: 17s8a - View Document

Superfluous Keys in Multivariate Quadratic Asymmetric Systems Christopher Wolf and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {Christopher.Wolf,Bart.Preneel}@esat.kuleuven

Superfluous Keys in Multivariate Quadratic Asymmetric Systems Christopher Wolf and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {Christopher.Wolf,Bart.Preneel}@esat.kuleuven

DocID: 138MO - View Document

Equivalent Keys in Multivariate Quadratic Public Key Systems Christopher Wolf1,2 , and Bart Preneel1 1 K.U.Leuven, ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium

Equivalent Keys in Multivariate Quadratic Public Key Systems Christopher Wolf1,2 , and Bart Preneel1 1 K.U.Leuven, ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium

DocID: 130HO - View Document

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog

DocID: 12Hys - View Document