Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Enrico Thomae"'
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783662464465
Public Key Cryptography
Public Key Cryptography
We investigate the security of the family of MQQ public key cryptosystems using multivariate quadratic quasigroups (MQQ). These cryptosystems show especially good performance properties. In particular, the MQQ-SIG signature scheme is the fastest sche
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6fc4854c3894f295bb15198586562393
https://doi.org/10.1007/978-3-662-46447-2_7
https://doi.org/10.1007/978-3-662-46447-2_7
Autor:
Christopher Wolf, Enrico Thomae
Publikováno v:
Public Key Cryptography – PKC 2012 ISBN: 9783642300561
Public Key Cryptography
Public Key Cryptography
Solving systems of m $\mathcal M$ ultivariate $\mathcal Q$ uadratic ( $\mathcal{MQ}$ ) equations in n variables is one of the main challenges of algebraic cryptanalysis. Although the associated $\mathcal{MQ}$ -problem is proven to be NP-complete, we
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::97d69479fd68963f18a0da1b15ddbe8b
https://doi.org/10.1007/978-3-642-30057-8_10
https://doi.org/10.1007/978-3-642-30057-8_10
Autor:
Enrico Thomae
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642329272
SCN
SCN
The Rainbow Signature Scheme is a non-trivial generalization of the well known Unbalanced Oil and Vinegar Signature Scheme (Eurocrypt '99) minimizing the length of the signatures. Recently a new variant based on non-commutative rings, called NC-Rainb
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7bd70a905d8cc95ad3e2eddab6770976
https://doi.org/10.1007/978-3-642-32928-9_20
https://doi.org/10.1007/978-3-642-32928-9_20
Autor:
Christopher Wolf, Enrico Thomae
Publikováno v:
Progress in Cryptology-AFRICACRYPT 2012 ISBN: 9783642314094
AFRICACRYPT
AFRICACRYPT
We show that the two multivariate signature schemes Enhanced STS, proposed at PQCrypto 2010, and Enhanced TTS, proposed at ACISP 2005, are vulnerable due to systematically missing cross-terms. To this aim, we generalize equivalent keys to so-called g
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::042e315dd1961cc00b2cb22a800beeed
https://doi.org/10.1007/978-3-642-31410-0_12
https://doi.org/10.1007/978-3-642-31410-0_12
Publikováno v:
Cryptographic Hardware and Embedded Systems – CHES 2012 ISBN: 9783642330261
CHES
CHES
Multivariate Quadratic Public Key Schemes (MQPKS) attracted the attention of researchers in the last decades for two reasons. First they are thought to resist attacks by quantum computers and second, most of the schemes were broken. The latter may be
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ea0b58bc8334fc96b37b9e45ee9f4c7e
https://doi.org/10.1007/978-3-642-33027-8_22
https://doi.org/10.1007/978-3-642-33027-8_22
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642253843
ASIACRYPT
ASIACRYPT
Decoding random linear codes is a fundamental problem in complexity theory and lies at the heart of almost all code-based cryptography. The best attacks on the most prominent code-based cryptosystems such as McEliece directly use decoding algorithms
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::78dc11c9a272d8651db74f6277e77ffb
https://doi.org/10.1007/978-3-642-25385-0_6
https://doi.org/10.1007/978-3-642-25385-0_6
Autor:
Enrico Thomae, Christopher Wolf
Publikováno v:
Post-Quantum Cryptography ISBN: 9783642254048
PQCrypto
PQCrypto
Square is a multivariate quadratic encryption scheme proposed in 2009. It is a specialization of Hidden Field Equations by using only odd characteristic fields and also X2 as its central map. In addition, it uses embedding to reduce the number of var
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::561cf8e8bdd5ecf8548c7773937715b3
https://doi.org/10.1007/978-3-642-25405-5_6
https://doi.org/10.1007/978-3-642-25405-5_6
Publikováno v:
Cryptographic Hardware and Embedded Systems – CHES 2011 ISBN: 9783642239502
CHES
CHES
Security of public key schemes in a post-quantum world is a challenging task—as both RSA and ECC will be broken then. In this paper, we show how post-quantum signature systems based on \(\mathcal{M}\)ultivariate \(\mathcal{Q}\)uadratic (\(\mathcal{
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::775cbcf9ade54b5c850efadb5cd2a6a1
https://doi.org/10.1007/978-3-642-23951-9_31
https://doi.org/10.1007/978-3-642-23951-9_31