DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Hidden Field Equations
Hidden Field Equations
Etsi Gr Qsc 001 V1.1.1 (2016-07)
Algebraic Cryptanalysis of Hidden Field Equations Family
Building Secure Public Key Encryption Scheme from Hidden Field Equations
THE END of CRYPTOGRAPHY AS WE KNOW IT ABOUT ISARA About ISARA
On Multivariate Signature-Only Public Key Cryptosystems
On the Differential Security of the Hfev- Signature Primitive
Multivariate Public Key Cryptography
Lecture Notes in Computer Science 5312 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan Van Leeuwen
Multivariable Public–Key Cryptosystems
Post-Quantum Cryptography
SOFIA: MQ-Based Signatures in the QROM
Securing M2M with Post-Quantum Public-Key Cryptography
Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP
DESIGN and CRYPTANALYSIS of POST QUANTUM CRYPTOSYSTEMS Olive Chakraborty
The 2Nd Round of the NIST PQC Standardization Process
View the Index
Odd-Char Multivariate Hidden Field Equations
LNCS 8772 Cryptography 6Th International Workshop, Pqcrypto 2014 Waterloo, ON, Canada, October 1–3, 2014 Proceedings
Top View
Algebraic Cryptanalysis of Hidden Field Equations Family
FACULTY of SCIENCE Syllabus
On Polynomial Systems Arising from a Weil Descent
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
Cryptography in a Post-Quantum World
Gui: Revisiting Multivariate Digital Signature Schemes Based on Hfev
Gröbner Bases of Structured Systems and Their Applications in Cryptology
Advanced Cryptography – Master SCCI
Multivariate Cryptography Part 3: HFE (Hidden Field Equations)
Signing Information in the Quantum Era Signing Information in the Quantum Era K
Toward Securing Links and Large-Scale Networks of Resource-Limited Devices
Secure Hardware Implementation of Post Quantum Cryptosystems
Analysis of Hidden Field Equations Cryptosystem Over Odd-Characteristic Fields
Analysis and Design of Post-Quantum Cryptographic Algorithms: PKP-Based Signature Scheme and Ultra-Short Multivariate Signatures
Post-Quantum Multivariate Cryptography
Digital Signatures in a Quantum World: Evaluating the Trade-Off Between Performance and Security for Gemss
Securing M2M with Post-Quantum Public-Key Cryptography
What Is Post-Quantum Cryptography?
Subliminal Channels in High-Speed Signatures
On Polynomial Systems Arising from a Weil Descent
Securing M2M with Post-Quantum Public-Key Cryptography
A New Multivariate Encryption Scheme
Applications of Finite Field Computation to Cryptology: Extension Field Arithmetic in Public Key Systems and Algebraic Attacks on Stream Ciphers
Hidden Field Equations (HFE) 1
A Zero-Knowledge Proof Based on a Multivariate Polynomial Reduction of the Graph Isomorphism Problem
Signing Information in the Quantum Era 2 Dating Back at Least 5 Millennia1
References of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC Press 2006
Ring Signature Scheme Based on Multivariate Public Key Cryptosystems
Algebraic Methods in Block Cipher Cryptanalysis
On Difference Maps and Their Cryptographic Applications
The Complexity of Public-Key Cryptography
Public-Key Cryptography from New Multivariate Quadratic Assumptions
From 5-Pass MQ-Based Identification to MQ-Based Signatures
Automatic Generation of High Speed Elliptic Curve Cryptography Code