The Security of Hidden Field Equations (HFE)
- 2 April 2001
- book chapter
- Published by Springer Nature
- p. 266-281
- https://doi.org/10.1007/3-540-45353-9_20
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Attacks on the Birational Permutation Signature SchemesPublished by Springer Nature ,2001
- QUARTZ, 128-Bit Long Digital SignaturesPublished by Springer Nature ,2001
- FLASH, a Fast Multivariate Signature AlgorithmPublished by Springer Nature ,2001
- C−+* and HM: Variations Around Two Schemes of T. Matsumoto and H. ImaiPublished by Springer Nature ,1998
- Hidden Monomial CryptosystemsPublished by Springer Nature ,1998
- Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric AlgorithmsPublished by Springer Nature ,1996
- Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt’88Published by Springer Nature ,1995
- Computing Frobenius maps and factoring polynomialsPublished by Association for Computing Machinery (ACM) ,1992
- Matrix multiplication via arithmetic progressionsJournal of Symbolic Computation, 1990
- Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-EncryptionPublished by Springer Nature ,1988