DING Jintai, GOWER J E, SCHMIDT D S. Multivariate public key cryptosystems[M]. New York: Springer, 2006: 2-3, 246-247.
[2]
刘振华, 胡予濮, 牟宁波. 基于身份认证密钥协商的分析与改进[J]. 哈尔滨工程大学学报, 2009, 30(10): 1194-1198. LIU Zhenhua, HU Yupu, MU Ningbo. Analysis and improvement of identity-based authenticated key agreement[J]. Journal of Harbin Engineering University, 2009, 30(10): 1194-1198.
[3]
BETTALE L, FAUG?RE J C, PERRET L. Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic[J]. Designs, Codes and Cryptography, 2013, 69(1): 1-52.
[4]
GAO Shuhong, HEINDL R. Multivariate public key cryptosystems from diophantine equations[J]. Designs, Codes and Cryptography, 2013, 67(1): 1-18.
[5]
YUAN Feng, SUN Ying, JIANG Jijun, et al. A multivariate public key cryptographic scheme[J]. China Communications, 2014, 11(12): 120-124.
[6]
WOLF C, PRENEEL B. Equivalent keys in HFE, C*, and variations[C]//Progress in Cryptology-MYCRPT 2005. Berlin, 2005: 33-49.
[7]
BOUILLAGUET C, FOUQUE P A, V?BER A. Graph-theoretic algorithms for the “isomorphism of polynomials” problem[C]//Advances in Cryptology-EUROCRYPT 2013. Berlin, 2013: 211-227.
[8]
DING Jintai, CLOUGH C, ARAUJO R. Inverting square systems algebraically is exponential[J]. Finite Fields and Their Applications, 2014, 26: 32-48.
[9]
CAO Weiwei, HU Lei. Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH[J]. Designs, Codes and Cryptography, 2014, 73(3): 719-730.