共 9 条
[1]
Matsumoto T., Imai H., Public quadratic polynomial-tuples for efficient signature-verification and message-encryption, Advances in Cryptology-EuroCrypto'88, pp. 419-453, (1988)
[2]
Patarin J., Hidden fields equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms, Advances in Cryptology-Eurocrypt'96, pp. 33-48, (1996)
[3]
Kipnis A., Patarin J., Goubin L., Unbalanced oil and vinegar signature schemes, Advances in Cryptology-EUROCRYPT'99, pp. 206-222, (1999)
[4]
Ding J., Wolf C., Yang B., l-Invertible cycles for multivariate quadratic (MQ) public key cryptography, Public Key Cryptography, pp. 266-281, (2007)
[5]
Tsujii S., Itoh T., Fujioka A., Et al., Public-key cryptosystem based on the difficulty of solving a system of nonlinear equations, Electronics Letters, 11, 23, pp. 558-560, (1987)
[6]
Faugere J.C., A new efficient algorithm for computing Grobner bases, Journal of Pure and Applied Algebra, 139, pp. 61-88, (1999)
[7]
Faugere J.C., Levy-Dit-Vehel F., Perret L., Cryptanalysis of min-rank, Advances in Cryptology-CRYPTO'2008, pp. 280-296, (2008)
[8]
Tao C., Diene A., Tang S., Et al., Simple matrix scheme for encryption, Post-quantum Cryptography, pp. 231-242, (2013)
[9]
Goubin L., Nicolas T.C., Cryptanalysis of the TTM cryptosystem, Advances in Cryptology-AsiaCrypto'2000, pp. 44-57, (2000)