1. Mu N B, Hu Y P, Ou H W. Broadcast encryption schemes based on RSA. The Journal of China Universities of Posts and Telecommunications, 2009, 16 (1): 69-75
2. Ding J, Gower J E, Schmidt D S. Multivariate public key cryptosystems. New York, NY, USA: Springer, 2006: 2-3
3. Matsumoto T, Imai H. Public quadratic polynominal-tuples for efficient signature-verification and message-encryption. Advances in Cryptology: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (Eurocrypt’88), May 25-27, 1988, Davos, Switzerland. LNCS 330. Berlin, Germany: Springer-Verlag, 1988: 419-453
4. Patarin J. Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt’88. Advances in Cryptology: Proceedings of the 15th Annual International Cryptology Conference (Crypto’95), Aug 27-31, 1995, Santa Barbara, CA, USA. LNCS 963. Berlin, Germany: Springer-Verlag, 1995: 248-261
5. Patarin J. Hidden field equations (HFE) and isomorphism of polynomials (IP): Two new families of asymmetric algorithms. Advances in Cryptology: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (Eurocrypt’96), May 12-16, 1996, Saragossa, Spain. LNCS 1070. Berlin, Germany: Springer-Verlag, 1996: 33-48
6. Patarin J. Asymmetric cryptography with a hidden monomial. Advances in cryptology:Proceedings of the 16th Annual International Cryptology Conference (Crypto’96), Aug 18-22,1996, Santa Barbara, CA, USA. LNCS 1109. Berlin, Germany: Springer-Verlag, 1996: 45-60
7. Kipnis A, Shamir A. Cryptanalysis of the HFE public key cryptosystem by relinearization. Advances in Cryptology: Proceedings of the 19th Annual International Cryptology Conference (Crypto’99), Aug 15-19, 1999, Santa Barbara, CA, USA. LNCS 1666. Berlin, Germany: Springer-Verlag, 1999: 19-30
8. Goubin L, Courtois N. Cryptanalysis of the TTM cryptosystem. Advances in cryptology: Proceeding of International Conference on the Theory and Applications of Cryptologic Techniques(Asiacrypt’00), Dec 3-7, 2000, Kyoto, Japan. LNCS 1976. Berlin, Germany: Springer-Verlag, 2000: 44-57
9. Courtois N. The security of hidden field equations (HFE). Topics in cryptology: Proceedings of Topics in Cryptology (CT-RSA’01), Apr 8-12, 2001, San Francisco, CA, USA. LNCS 2020. Berlin, Germany: Springer-Verlag, 2001: 266-281
10. Coppersmith D, Stern J, Vaudenay S. The security of the birational permutation signature schemes. Journal of Cryptology, 1997, 10(3): 207-221
11. Faugère J C, Vehel F L, Perret L. Cryptanalysis of MinRank. Advances in Crytography:Proceedings of the 28th Annual International Cryptology Conference (Crypto’08), Aug 17-21, 2008, Santa Barbara, CA, USA. LNCS 5157. Berlin, Germany: Springer-Verlag, 2008: 280-296
12. Courtois N. Efficient zero-knowledge authentication based on a linear algebra problem MinRank. Advances in Cryptology: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt’01), Dec 9-13, 2001, Gold Coast, Australia. LNCS 2248. Berlin, Germany: Springer-Verlag, 2001: 402-421 |