[图书][B] Handbook of finite fields

GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …

Multivariate public-key cryptosystems

J Ding, JE Gower, DS Schmidt - … conference on the Algebra and its …, 2005 - Springer
For the last three decades, public-key cryptography has completely changed the landscape
of our modern communication systems and become an indispensable part of the foundation …

The new implementation schemes of the TTM cryptosystem are not secure

J Ding, D Schmidt - Coding, cryptography and combinatorics, 2004 - Springer
We show that the new TTM implementation schemes have a defect. There exist linearization
equations ∑ i= 1, j= 1^ n, m a_ ij x_i y_j (x_1, ..., x_n)+ ∑ i= 1^ n b_i x_i+ ∑ j= 1^ m c_j y_j …

Cryptanalysis of the new tts scheme in ches 2004

J Ding, D Schmidt, Z Yin - International Journal of Information Security, 2006 - Springer
We combine the method of searching for an invariant subspace of the unbalanced Oil and
Vinegar signature scheme and the Minrank method to defeat the new TTS signature …

Breaking a new instance of TTM cryptosystems

X Nie, L Hu, J Li, C Updegrove, J Ding - … ACNS 2006, Singapore, June 6-9 …, 2006 - Springer
In 2004, the inventors of TTM cryptosystems proposed a new scheme that could resist the
existing attacks, in particular, the Goubin-Courtois attack GC00 and the Ding-Schmidt attack …

Digital signature schemes using non-square matrices or scrap automorphisms

J Chen, D Grigoriev, V Shpilrain - International Journal of …, 2024 - Taylor & Francis
Full article: Digital signature schemes using non-square matrices or scrap automorphisms Skip
to Main Content Taylor and Francis Online homepage Taylor and Francis Online homepage …

[PDF][PDF] On tameness of Matsumoto-Imai central maps in three variables over the finite field F2

K Hakuta, H Sato, T Takagi - Adv. Math. Commun, 2016 - pdfs.semanticscholar.org
Triangular transformation method (TTM) is one of the multivariate public key cryptosystems
(MPKC) based on the intractability of tame decomposition problem. In TTM, a special class …

[PDF][PDF] Sign of permutation induced by Nagata automorphism over finite fields

K Hakuta, T Takagi - Journal of Mathematics Research, 2017 - pdfs.semanticscholar.org
This paper proves that the Nagata automorphism over a finite field can be mimicked by a
tame automorphism which is a composition of four elementary automorphisms. By …

An Improved Medium-Field Multivariate Public-Key Encryption Scheme

H Tao, Y Chen - 2009 International Conference on …, 2009 - ieeexplore.ieee.org
The MFE cryptosystem proposed by Wang et al. uses medium-size field extensions, which
makes faster. However, it is insecure due to SOLEs attack by Ding et al.. In this paper, we …

Cryptanalysis of the TRMC-4 Public Key Cryptosystem

X Nie, L Hu, J Ding, J Li, J Wagner - International Conference on Applied …, 2007 - Springer
In 2006, the inventors of TRMC public key cryptosystem proposed a new variant of TRMC,
TRMC-4, which can resist the existing attack, in particular, the Joux et al attack. In this paper …