[1] | MOHTT.A fast public key system with signature and master key functions[C]∥Proceeding of CryTEC 1999.Hongkong:Hongkong City University Press,1999:63-69.
|
[2] | DING J,HU L,NIE X Y,et al.High order linearization equation(HOLE)attack on multivariate public key cryptosystems[C]∥Proceedings of PKC 2007.Berlin:Springer-Verlag,2007:233-248.
|
[3] | WANG X Y.YU H.How to break MD5 and other hash functions[C]∥Proceedings of Eurocrypt 2005.Berlin:Springer-Verlag,2005:19-35.
|
[4] | WANG X Y,YAO A,YAO F.Cryptanalysis of SHA-1 hash function[C]∥Proceedings of Crypto 2005.Berlin:Sringer-Verlag,2005:17-36.
|
[5] | BILLETO,ROBSHAW,PEYRIN T.On building hash functions from multivariate quadratic equations[C]∥Proceedings ofACISP 2007.Berlin:Springer-Verlag,2007:82-95.
|
[6] | DING J,YANG B Y.Multivariates polynomials for hashing[C]∥Proceeding of Inscrypt 2007.Berlin:Springer-Verlag,2007:308-371.
|
[7] | AUMASSON J,MEIER W.Analysis of multivariate hash functions[C]∥Proceedings of ICISC 2007.Berlin:Springer-Verlag,2007:309-323.
|
[8] | BERBAIN C,GILLBERTH,PATARIN J.QUAD:A practical stream cipher with provable security[C]∥Proceedings ofEurocrypt 2006.Berlin:Springer-Verlag,2006:109-128.
|
[9] | YANG B Y,BERNSTEIN D J,CHEN J M.Analysis of QUAD[C]∥Proceedings of FSE 2007.Berlin:Springer-Verlag,2007:290-308.
|
[10] | BERBAIN C.QUAD:Amultivariate stream cipher with provable security[J].Journal of Symbolic Computation,2009(12):1703-1723.
|
[11] | DING J T,WOLF C,YANG B Y.l-invertible cycles for multivariate quadratic public key cryptography[C]∥Proceedings ofPKC 2007.Berlin:Springer-Verlag,2007:266-281.
|
[12] | 唐樨瑾,冯勇.Dixon结式在密码学中的应用[J].软件学报,2007,18(7):1738-1745.TANG Xi-jin,FENG Yong.Applying Dixon resultants in cryptography[J].Journal of Software,2007,18(7):1738-1745.(in Chinese)
|
[13] | 管海明.公钥密码如何应对量子计算的挑战[J].信息安全与通信保密,2007,8(8):35-54.GUAN Hai-ming.How public key cryptosystem confronts the challenge from quantum computing[J].Information Securityand Communications Privacy,2007,8(8):35-54.(in Chinese)
|
[14] | 陈辉焱,王连强,吕述望.关于HFE密码系统的密钥问题研究[J].计算机研究与发展,2007,44(7):1205-1210.CHEN Hui-yan,WANG Lian-qiang,L Shu-wang.A study of key problems of HFE cryptosystem[J].Journal of ComputerResearch and Development,2007,44(7):1205-1210.(in Chinese)
|
[15] | SHOR P W.Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J].SIAM JComputer,1997(5):1484-1509.
|
[16] | DING J T.Multivariate public key cryptosystems[M].Berlin:Springer-Verlag,2006:1-10.
|
[17] | GAREY M,JOHNSOND.Computers and intractability,a guide to the theory of NP-completeness[M].NewYork:Freeman,1979:128-130.
|
[18] | PATARIN J,GOUBIN J.Trapdoor one-way permutati-ons and multivariate polynomials[C]∥Proceedings of ICISC 1997.Berlin:Springer-Verlag,1997:356-368.
|
[19] | PATARIN J.Hidden field equations(HFE)and isomorphisms of polynomials(IP):two new families of asymmetricalgorithms[C]∥Proceedings of Eurocrypt 1996.Berlin:Springer-Verlag,1996:33-48.
|
[20] | FAUGERE J C.A new efficient algorithm for computing Gr bner bases without reduction to zero(F5)[C]∥Proceedings ofISSAC2002.New York:ACM Press,2002:75-83.
|
[21] | FAUGERE J C,JOUX A.Algebraic cryptanalysis of hidden field equations(HFE)using Gr bner bases[C]∥Proceedings ofCrypto 2003.Berlin:Springer-Verlag,2003:44-60.
|
[22] | COURTOIS N T,KLIMOV A,PATARIN J,et al.Efficient algorithms for solving overdefined systems of multivar-iatepolynomial equations[C]∥Proceedings of Eurocrypt 2000.Berlin:Springer-Verlag,2000:392-407.
|
[23] | COURTOIS N,PIEPRZYK J.Cryptanalysis of block ciphers with overdefined systems of equations[C]∥Proceedings ofAsiacrypt 2002.Berlin:Springer-Verlag,2002:267-287.
|
[24] | COURTOIS N,GOUBIN L,MEIER W,et al.Solving underdefined systems of multivariate quadratic equations[C]∥Proceedings of PKC 2002.Berlin:Springer-Verlag,2002:211-227.
|
[25] | MATSUMOTO T,IMAI H.Public quadratic polynomial-tuples for efficient signature verification and message encryption[C]∥Proceedings of Eurocryp 1988.Berlin:Springer-Verlag,1988:419-453.
|
[26] | PATARIN J.Cryptanalysis of the matsumoto and imai public key scheme of eurocrypt1988[C]∥Proceedings of Crypto1995.Berlin:Springer-Verlag,1995:248-261.
|
[27] | AKKAR M,COURTIOS N.A fast and secure implementation of SFLASH[C]∥Proceedings of PKC 2003.Berlin:Springer-Verlag,2003:267-278.
|
[28] | DUBOIS V,FOUQUE P A,SHAMIR A,et al.Practical cryptanalysis of SFLASH[C]∥Proceedings of Crypto 2007.Berlin:Springer-Verlag,2007:1-12.
|
[29] | DING J,GOWER J.Inoculating multivariate schemes against differential attacks[C]∥Proceedings of PKC 2006.Berlin:Springer-Verlag,2006:290-301.
|
[30] | PATARIN J,COURTOIS N,GOUBIN L.QUARTZ,128-bit long digital signatures[C]∥Proceedings of CT-RSA 2001.Berlin:Springer-Verlag,2001:298-307.
|
[31] | DING J,SCHMIDTD.Cryptanalysis of HFEVand the internal perturbation of HFE[C]∥Proceedings of PKC 2005.Berlin:Springer-Verlag,2005:288-301.
|
[32] | DING J.Multivariate public key cryptosystems[M].Berlin:Sringer-Verlag,2006:64-68.
|
[33] | KIPNIS A,PARARIN J,GOUBIN L.Unbalanced oil and vinegar signature schemes[C]∥Proceedings of Eurocrypt 1999.Berlin:Springer-Verlag,1999:206-222.
|
[34] | DING J,SCHMIDTD.Rainbow,a newmultivariate public key signature scheme[C]∥Proceedings of ACNS 2005.Berlin:Springer-Verlag,2005:164-175.
|
[35] | KIPNIS A,SHAMIR A.Cryptanalysis of the oil&vinegar signature scheme[C]∥Proceedings of Crypto 1998.Berlin:Springer-Verlag,1998:257-267.
|
[36] | FELL H,DIFFIE W.Analysis of public key approach based on polynomial substitution[C]∥Proceedings of Crypto 1985.Berlin:Springer-Verlag,1985:340-349.
|
[37] | SHAMIR A.Efficient signature schemes based on birational permutations[C]∥Proceedings of Crypto 1993.Berlin:Springer-Verlag,1993:1-12.
|