A survey of public-key cryptographic primitives in wireless sensor networks

KA Shim - IEEE Communications Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Cryptographic primitives are fundamental building blocks for designing security protocols to
achieve confidentiality, authentication, integrity and non-repudiation. It is not too much to say …

[图书][B] Handbook of finite fields

GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …

Quasigroups and their applications in cryptography

D Chauhan, I Gupta, R Verma - Cryptologia, 2021 - Taylor & Francis
Full article: Quasigroups and their applications in cryptography Skip to Main Content Taylor and
Francis Online homepage Taylor and Francis Online homepage Log in | Register Cart 1.Home …

Graph-theoretic algorithms for the “isomorphism of polynomials” problem

C Bouillaguet, PA Fouque, A Véber - … on the Theory and Applications of …, 2013 - Springer
We give three new algorithms to solve the “isomorphism of polynomial” problem, which was
underlying the hardness of recovering the secret-key in some multivariate trapdoor one-way …

MQQ-SIG: An ultra-fast and provably CMA resistant digital signature scheme

D Gligoroski, RS Ødegård, RE Jensen, L Perret… - … Conference on Trusted …, 2011 - Springer
We present MQQ-SIG, a signature scheme based on “Multivariate Quadratic Quasigroups”.
The MQQ-SIG signature scheme has a public key consisting of n2 quadratic polynomials in …

Algebraic attack on the MQQ public key cryptosystem

MSE Mohamed, J Ding, J Buchmann… - Cryptology and Network …, 2009 - Springer
In this paper, we present an efficient attack on the multivariate Quadratic Quasigroups
(MQQ) public key cryptosystem. Our cryptanalysis breaks the MQQ cryptosystem by solving …

A polynomial-time key-recovery attack on MQQ cryptosystems

JC Faugère, D Gligoroski, L Perret… - … Workshop on Public …, 2015 - Springer
We investigate the security of the family of MQQ public key cryptosystems using multivariate
quadratic quasigroups (MQQ). These cryptosystems show especially good performance …

Design of crypto primitives based on quasigroups

S Markovski - Quasigroups and Related Systems, 2015 - ibn.idsi.md
Today, the security of the modern world is undoubtedly dependent on the cryptographic
primitives built into the various protocols used for secure communication. Let us mention …

[PDF][PDF] Generating huge quasigroups from small non-linear bijections via extended Feistel function

S Markovski, A Mileva - Quasigroups and related systems, 2009 - eprints.ugd.edu.mk
Quasigroups of huge order, like 2^ 256, 2^ 512, 2^ 1024, that can be effectively constructed,
have important applications in designing several cryptographic primitives. We propose an …

A generalization of the Rainbow Band Separation attack and its applications to multivariate schemes

E Thomae - Cryptology ePrint Archive, 2012 - eprint.iacr.org
Abstract The Rainbow Signature Scheme is a non-trivial generalization of the well known
Unbalanced Oil and Vinegar (UOV) signature scheme (Eurocrypt'99) minimizing the length …