Imai H, Matsumoto T. Algebraic methods for construc-ting asymmetric cryptosystems//Algebraic Algorithms and Error-Correcting Codes, 3rd International Conference, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 1985: 108-119.
[2]
Gouget A, Patarin J. Probabilistic multivariate cryptography//VIETCRYPT 2006, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2006: 1-18.
[3]
Patarin J. Hidden field equations(HFE) and isomorphisms of polynomials(IP): two new families of asymmetric algorithms//Advance in Cryptology-EUROCRYPT 1996, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 1996: 33-48.
[4]
Blake I, Seroussi G, Smart N. Elliptic curves in cryptography[M]. London: Cambridge University Press, 1999: 20-26.
[5]
Patarin J. Cryptanalysis of matsumoto and imai public key scheme of eurocrypt'88//Advances in Cryptology-CRYPTO 1995, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 1995: 248-261.
[6]
Fouque P A, Granboulan L, Stern J. Differential cryptanalysis for multivariate schemes//Advance in Cryptology-EUROCRYPT 2005, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2005: 341-353.
[7]
Yang Boyin, Chen Jiunming. Building secure tame-like multivariate public key cryptosystems-the new TTS//Information Security and Privacy: 10th Australasian Conference-ACISP 2005, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2005: 518-531.
[8]
Courtois N, Klimov A, Patarin J, et al. Efficient algorithms for solving overdefined systems of multivariate polynomial equations//Advance in Cryptology-EUROCRYPT 2000, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2000: 392-407.
[9]
Yang Boyin, Chen Junming, Courtois N. On asymptotic security estimates in XL and Grbner bases-related algebraic cryptanalysis//Information and Communications Security-ICICS 2004, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2004: 401-413.