Progress in multivariate cryptography: Systematic review, challenges, and research directions
J Dey, R Dutta - ACM Computing Surveys, 2023 - dl.acm.org
Multivariate Public Key Cryptosystem (MPKC) seem to be promising toward future digital
security even in the presence of quantum adversaries. MPKCs derive their security from the …
security even in the presence of quantum adversaries. MPKCs derive their security from the …
Breaking rainbow takes a weekend on a laptop
W Beullens - Annual International Cryptology Conference, 2022 - Springer
This work introduces new key recovery attacks against the Rainbow signature scheme,
which is one of the three finalist signature schemes still in the NIST Post-Quantum …
which is one of the three finalist signature schemes still in the NIST Post-Quantum …
[PDF][PDF] Status report on the second round of the NIST post-quantum cryptography standardization process
G Alagic, J Alperin-Sheriff, D Apon… - US Department of …, 2020 - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
one or more public-key cryptographic algorithms through a public, competition-like process …
one or more public-key cryptographic algorithms through a public, competition-like process …
[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …
publickey cryptographic algorithms through a public, competition-like process. The new …
Improved cryptanalysis of UOV and rainbow
W Beullens - Annual International Conference on the Theory and …, 2021 - Springer
The contributions of this paper are twofold. First, we simplify the description of the
Unbalanced Oil and Vinegar scheme (UOV) and its Rainbow variant, which makes it easier …
Unbalanced Oil and Vinegar scheme (UOV) and its Rainbow variant, which makes it easier …
Quantum-safe cryptography: crossroads of coding theory and cryptography
We present an overview of quantum-safe cryptography (QSC) with a focus on post-quantum
cryptography (PQC) and information-theoretic security. From a cryptographic point of view …
cryptography (PQC) and information-theoretic security. From a cryptographic point of view …
Efficient key recovery for all HFE signature variants
The HFE cryptosystem is one of the most popular multi-variate schemes. Especially in the
area of digital signatures, the HFEv-variant offers short signatures and high performance …
area of digital signatures, the HFEv-variant offers short signatures and high performance …
Take your MEDS: digital signatures from matrix code equivalence
In this paper, we show how to use the Matrix Code Equivalence (MCE) problem as a new
basis to construct signature schemes. This extends previous work on using isomorphism …
basis to construct signature schemes. This extends previous work on using isomorphism …
[图书][B] Concise encyclopedia of coding theory
Most coding theory experts date the origin of the subject with the 1948 publication of A
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …
Revisiting algebraic attacks on MinRank and on the rank decoding problem
Abstract The Rank Decoding problem (RD) is at the core of rank-based cryptography.
Cryptosystems such as ROLLO and RQC, which made it to the second round of the NIST …
Cryptosystems such as ROLLO and RQC, which made it to the second round of the NIST …