搜索结果: 1-15 共查到“军事学 Multivariate”相关记录86条 . 查询时间(0.093 秒)
The Singularity Attack to the Multivariate Signature Scheme Himq-3
Multivariate public key cryptosystem Cryptanalysis Oil Vinegar Signature Scheme
2019/8/6
In 2017 Kyung-Ah Shim et al proposed a multivariate signature scheme called Himq-3 which is a submission to National Institute of Standards and Technology (NIST) standardization process of post-quantu...
On inverse protocols of Post Quantum Cryptography based on pairs of noncommutative multivariate platforms used in tandem
Multivariate Cryptography Noncommutative Cryptography stable transformation groups and semigroups
2019/8/6
Non-commutative cryptography studies cryptographic primitives and systems which are based on algebraic structures like groups, semigroups and noncommutative rings. We con-tinue to investigate inverse ...
On Noncommutative Cryptography and homomorphism of stable cubical multivariate transformation groups of infinite dimensional affine spaces
Multivariate Cryptography stable transformation groups and semigroups decomposition problem of nonlinear multivariate map into given generators
2019/6/3
Noncommutative cryptography is based on applications of algebraic structures like noncommutative groups, semigroups and non-commutative rings. Its inter-section with Multivariate cryptography contains...
On the Security of the Multivariate Ring Learning with Errors Problem
cryptanalysis lattice techniques public-key cryptography
2018/11/6
The Multivariate Ring Learning with Errors (mm-RLWE) problem was introduced in 2015 by Pedrouzo-Ulloa, Troncoso-Pastoriza and Pérez-González. Instead of working over a polynomial residue ring with one...
Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes
homomorphic encryption efficient polynomial evaluation ring lwe
2018/6/27
Homomorphic encryption schemes allow to perform computations over encrypted data. In schemes based on RLWE assumption the plaintext data is a ring polynomial. In many use cases of homomorphic encrypti...
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017
post-quantum cryptography multivariate public-key cryptography chosen message attack
2018/4/4
One of the most efficient post-quantum signature schemes is Rainbow whose harness is based on the multivariate quadratic polynomial (MQ) problem. ELSA, a new multivariate signature scheme proposed at ...
Rank Analysis of Cubic Multivariate Cryptosystems
multivariate cryptography cubic polynomials tensor rank
2018/1/31
In this work we analyze the security of cubic cryptographic constructions with respect to rank weakness. We detail how to extend the big field idea from quadratic to cubic, and show that the same rank...
Fast Quantum Algorithm for Solving Multivariate Quadratic Equations
NSA Solving Multivariate Quadratic Equations
2017/12/25
In August 2015 the cryptographic world was shaken by a sudden and surprising announcement by the US National Security Agency (NSA) concerning plans to transition to post-quantum algorithms. Since this...
Asymptotically faster quantum algorithms to solve multivariate quadratic equations
FXL Grover reversibility
2017/12/19
Asymptotically faster quantum algorithms to solve multivariate quadratic equations.
Two-Face: New Public Key Multivariate Schemes
Multivariate Cryptography HFE Generalization new multivariate quadratic permutations
2017/12/19
We present here new multivariate schemes that can be seen as HFE generalization having a property called `Two-Face'. Particularly, we present five such families of algorithms named `Dob', `Simple Pat'...
Multivariate Public Key Cryptography is a leading option for security in a post quantum society. In this paper we propose a new encryption scheme, EFLASH, and analyze its efficiency and security.
Solving Multivariate Polynomial Systems and an Invariant from Commutative Algebra
post-quantum cryptography multivariate cryptography Groebner basis
2017/6/22
The security of several post-quantum cryptosystems is based on the assumption that solving a system of multivariate (quadratic) polynomial equations p1=⋯=pm=0p1=⋯=pm=0 over a finite field ...
Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree
Multivariate Cryptography Fully Homomorphic Encryption Eprint 2017/458
2017/5/31
Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree.
Fully Homomorphic Encryption Using Multivariate Polynomials
public-key cryptography fully homomorphic encryption multivariate cryptography
2017/5/26
Efficient and secure third party computation has many practical applications in cloud computing. We develop new approach for building fully homomorphic encryption (FHE) schemes, by starting with the i...
FHPKE based on multivariate discrete logarithm problem
fully homomorphic public-key encryption multivariate discrete logarithm problem octonion ring
2017/5/23
Previously I proposed fully homomorphic public-key encryption (FHPKE) based on discrete logarithm problem which is vulnerable to quantum computer attacks. In this paper I propose FHPKE based on multiv...