Vivien Dubois,Nicolas Gama.The degree of regularity of HFE systems [A].Cryptology - ASIACRYPT 2010-16th International Conference on the Theory and Application of Cryptology and Information Security [C].Berlin,2010,6477,557-576.
[2]
Jintai Ding,Timothy J,Victoria Kruglov.Growth of the ideal generated by a quadratic boolean function [A].PQCrypto 2010 [C].Berlin,2010,6061,13-27.
[3]
Christopher Wolf,An Braeken,Bart Preneel.Efficient cryptnalysis of RSE(2)PKC and RSSE(2)PKC [OL].Cryptology ePrint Archive.http://eprint.iacr.org/,2011.8.11.
[4]
Mohamed,M,Cabarcas,D,Ding,J,et al.An Efficient Algorithm for Computing Grobner Bases of Zero-Dimensional Ideals [A].Information security and cryptology ICISC 2009 [C].Berlin 2010,5984:87-100.
[5]
Jintai Ding.Multivariate Public Key Cryptosystems[M].Berlin:Springer-Verlag,2006.94-96
[6]
P W Shor.Polynomial-Time Algorithms for prime factorization and discrete logarithms on a quantum computer [J].SIAM Journal on Computing,1997,26(5):1484-1509.(preliminary version in FOCS 1994)
[7]
付向群,鲍皖苏,周淳,钟普查.具有高概率的整数分解量子算法[J].电子学报,2011,39(1):35-39. FU Xiang-qun,BAO Wan-su,ZHOU Chun,ZHONG Pu-cha.Quantum Algorithm for Prime Factorization with High Probability[J].Acta Electronica Sinica,2011,39(1):35-39.(in Chinese)
[8]
Jacques Patarin.Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt’88 [J].Computer Science,1995,963:248-261
[9]
WANG HouZhen,ZHANG HuanGuo,WANG ZhangYi,etc.Extended multivariate public key cryptosystems with secure encryption function[J].Science China,2011,54(6):1161-1171.