Cryptography Reference
In-Depth Information
11. Chen, C.H.O., Chen, M.S., Ding, J., Werner, F., Yang, B.Y.: Odd-char multivariate
Hidden Field Equations (2008), http://eprint.iacr.org/2008/543
12. Ciet, M., Joye, M.: Elliptic curve cryptosystems in the presence of permanent and
transient faults. Designs, Codes and Cryptography 36, 33-43 (2005)
13. Coppersmith, D., Stern, J., Vaudenay, S.: Attacks on the Birational Permutation
Signature Schemes. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp.
435-443. Springer, Heidelberg (1994)
14. Courtois, N.T., Daum, M., Felke, P.: On the Security of HFE, HFEv- and Quartz.
In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 337-350. Springer, Hei-
delberg (2002)
15. Courtois, N.T., Klimov, A.B., Patarin, J., Shamir, A.: Ecient Algorithms for
Solving Overdefined Systems of Multivariate Polynomial Equations. In: Preneel,
B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 392-407. Springer, Heidelberg
(2000)
16. Ding, J.: A New Variant of the Matsumoto-Imai Cryptosystem through Pertur-
bation. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp.
305-318. Springer, Heidelberg (2004)
17. Ding, J., Gower, J.E.: Inoculating Multivariate Schemes Against Differential At-
tacks. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS,
vol. 3958, pp. 290-301. Springer, Heidelberg (2006)
18. Ding, J., Gower, J.E., Schmidt, D., Wolf, C., Yin, Z.: Complexity Estimates for
the F 4 Attack on the Perturbed Matsumoto-imai Cryptosystem. In: Smart, N.P.
(ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 262-277. Springer,
Heidelberg (2005)
19. Ding, J., Schmidt, D.: Cryptanalysis of HFEv and Internal Perturbation of HFE. In:
Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 288-301. Springer, Heidelberg
(2005)
20. Ding, J., Schmidt, D.: Rainbow, a New Multivariate Polynomial Signature Scheme.
In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531,
pp. 164-175. Springer, Heidelberg (2005)
21. Ding, J., Wolf, C., Yang, B.-Y.: l− l−invertible Cycles for Multivariate Quadratic
(MQ) Public Key Cryptography. In: Okamoto, T., Wang, X. (eds.) PKC 2007.
LNCS, vol. 4450, pp. 266-281. Springer, Heidelberg (2007)
22. Dubois, V., Fouque, P.-A., Shamir, A., Stern, J.: Practical Cryptanalysis of
SFLASH. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 1-12.
Springer, Heidelberg (2007)
23. Faugere, J.C.: A new ecient algorithm for computing Grobner bases ( F 4 ). Journal
of Pure and Applied Algebra 139, 61-88 (1999)
24. Faugere, J.-C., Joux, A.: Algebraic Cryptanalysis of Hidden Field Equation (HFE)
Cryptosystems using Grobner Bases. In: Boneh, D. (ed.) CRYPTO 2003. LNCS,
vol. 2729, pp. 44-60. Springer, Heidelberg (2003)
25. Faugere, J.-C., Levy-dit-Vehel, F., Perret, L.: Cryptanalysis of Minrank. In: Wag-
ner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 280-296. Springer, Heidelberg
(2008)
26. Fouque, P.-A., Granboulan, L., Stern, J.: Differential Cryptanalysis for Multivariate
Schemes. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 341-353.
Springer, Heidelberg (2005)
27. Fouque, P.-A., Macario-Rat, G., Perret, L., Stern, J.: Total Break of the -IC
Signature Scheme. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 1-17.
Springer, Heidelberg (2008)
 
Search WWH ::




Custom Search