<--- Back to Details
First PageDocument Content
Cryptography / Algebra / Multivariate cryptography / Abstract algebra / Post-quantum cryptography / Hidden Field Equations / Algebraic geometry / Digital signature / Polynomial / Unbalanced Oil and Vinegar / Wu's method of characteristic set
Date: 2018-10-17 06:47:13
Cryptography
Algebra
Multivariate cryptography
Abstract algebra
Post-quantum cryptography
Hidden Field Equations
Algebraic geometry
Digital signature
Polynomial
Unbalanced Oil and Vinegar
Wu's method of characteristic set

Design Principles for HFEv- Based Multivariate Signature Schemes Albrecht Petzoldt1 , Ming-Shing Chen2,3 , Bo-Yin Yang2 , Chengdong Tao4 , and Jintai Ding5,6(B) 1

Add to Reading List

Source URL: precision.moscito.org

Download Document from Source Website

File Size: 445,07 KB

Share Document on Facebook

Similar Documents

MQ Challenge: Hardness Evaluation of Solving MQ problems

MQ Challenge: Hardness Evaluation of Solving MQ problems

DocID: 18rai - View Document

PDF Document

DocID: 17s8a - View Document

Superfluous Keys in Multivariate Quadratic Asymmetric Systems Christopher Wolf and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {Christopher.Wolf,Bart.Preneel}@esat.kuleuven

Superfluous Keys in Multivariate Quadratic Asymmetric Systems Christopher Wolf and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {Christopher.Wolf,Bart.Preneel}@esat.kuleuven

DocID: 138MO - View Document

Equivalent Keys in Multivariate Quadratic Public Key Systems Christopher Wolf1,2 , and Bart Preneel1 1 K.U.Leuven, ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium

Equivalent Keys in Multivariate Quadratic Public Key Systems Christopher Wolf1,2 , and Bart Preneel1 1 K.U.Leuven, ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium

DocID: 130HO - View Document

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog

DocID: 12Hys - View Document