<--- Back to Details
First PageDocument Content
Mathematics / Computer algebra / Finite fields / Algebraic geometry / Hidden Field Equations / Commutative algebra / QUAD / Polynomial / Unbalanced Oil and Vinegar / Abstract algebra / Algebra / Post-quantum cryptography
Date: 2015-04-09 11:40:15
Mathematics
Computer algebra
Finite fields
Algebraic geometry
Hidden Field Equations
Commutative algebra
QUAD
Polynomial
Unbalanced Oil and Vinegar
Abstract algebra
Algebra
Post-quantum cryptography

MQ Challenge: Hardness Evaluation of Solving MQ problems

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 418,60 KB

Share Document on Facebook

Similar Documents

MQ Challenge: Hardness Evaluation of Solving MQ problems

MQ Challenge: Hardness Evaluation of Solving MQ problems

DocID: 18rai - View Document

PDF Document

DocID: 17s8a - View Document

Superfluous Keys in Multivariate Quadratic Asymmetric Systems Christopher Wolf and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {Christopher.Wolf,Bart.Preneel}@esat.kuleuven

Superfluous Keys in Multivariate Quadratic Asymmetric Systems Christopher Wolf and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {Christopher.Wolf,Bart.Preneel}@esat.kuleuven

DocID: 138MO - View Document

Equivalent Keys in Multivariate Quadratic Public Key Systems Christopher Wolf1,2 , and Bart Preneel1 1 K.U.Leuven, ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium

Equivalent Keys in Multivariate Quadratic Public Key Systems Christopher Wolf1,2 , and Bart Preneel1 1 K.U.Leuven, ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium

DocID: 130HO - View Document

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog

DocID: 12Hys - View Document