A survey of public-key cryptographic primitives in wireless sensor networks
KA Shim - IEEE Communications Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Cryptographic primitives are fundamental building blocks for designing security protocols to
achieve confidentiality, authentication, integrity and non-repudiation. It is not too much to say …
achieve confidentiality, authentication, integrity and non-repudiation. It is not too much to say …
[图书][B] Handbook of finite fields
GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …
book for the theory and applications of finite fields. It is not intended to be an introductory …
Quasigroups and their applications in cryptography
Full article: Quasigroups and their applications in cryptography Skip to Main Content Taylor and
Francis Online homepage Taylor and Francis Online homepage Log in | Register Cart 1.Home …
Francis Online homepage Taylor and Francis Online homepage Log in | Register Cart 1.Home …
Graph-theoretic algorithms for the “isomorphism of polynomials” problem
We give three new algorithms to solve the “isomorphism of polynomial” problem, which was
underlying the hardness of recovering the secret-key in some multivariate trapdoor one-way …
underlying the hardness of recovering the secret-key in some multivariate trapdoor one-way …
MQQ-SIG: An ultra-fast and provably CMA resistant digital signature scheme
D Gligoroski, RS Ødegård, RE Jensen, L Perret… - … Conference on Trusted …, 2011 - Springer
We present MQQ-SIG, a signature scheme based on “Multivariate Quadratic Quasigroups”.
The MQQ-SIG signature scheme has a public key consisting of n2 quadratic polynomials in …
The MQQ-SIG signature scheme has a public key consisting of n2 quadratic polynomials in …
Algebraic attack on the MQQ public key cryptosystem
MSE Mohamed, J Ding, J Buchmann… - Cryptology and Network …, 2009 - Springer
In this paper, we present an efficient attack on the multivariate Quadratic Quasigroups
(MQQ) public key cryptosystem. Our cryptanalysis breaks the MQQ cryptosystem by solving …
(MQQ) public key cryptosystem. Our cryptanalysis breaks the MQQ cryptosystem by solving …
A polynomial-time key-recovery attack on MQQ cryptosystems
JC Faugère, D Gligoroski, L Perret… - … Workshop on Public …, 2015 - Springer
We investigate the security of the family of MQQ public key cryptosystems using multivariate
quadratic quasigroups (MQQ). These cryptosystems show especially good performance …
quadratic quasigroups (MQQ). These cryptosystems show especially good performance …
Design of crypto primitives based on quasigroups
S Markovski - Quasigroups and Related Systems, 2015 - ibn.idsi.md
Today, the security of the modern world is undoubtedly dependent on the cryptographic
primitives built into the various protocols used for secure communication. Let us mention …
primitives built into the various protocols used for secure communication. Let us mention …
[PDF][PDF] Generating huge quasigroups from small non-linear bijections via extended Feistel function
S Markovski, A Mileva - Quasigroups and related systems, 2009 - eprints.ugd.edu.mk
Quasigroups of huge order, like 2^ 256, 2^ 512, 2^ 1024, that can be effectively constructed,
have important applications in designing several cryptographic primitives. We propose an …
have important applications in designing several cryptographic primitives. We propose an …
A generalization of the Rainbow Band Separation attack and its applications to multivariate schemes
E Thomae - Cryptology ePrint Archive, 2012 - eprint.iacr.org
Abstract The Rainbow Signature Scheme is a non-trivial generalization of the well known
Unbalanced Oil and Vinegar (UOV) signature scheme (Eurocrypt'99) minimizing the length …
Unbalanced Oil and Vinegar (UOV) signature scheme (Eurocrypt'99) minimizing the length …