Author:
Chen Jiahui,Tang Shaohua,He Daojing,Tan Yang
Funder
National Natural Science Foundation of China (CN)
National Natural Science Foundation of China
973 Program
Guangdong Provin- cial Natural Science Foundation
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference33 articles.
1. Borges, F., Petzoldt, A., & Portugal, R. (2014). Small private keys for systems of multivariate quadratic equations using symmetric cryptography.
http://www.informatik.tu-darmstadt.de/fileadmin/userupload/GroupTK/UOVcnmac2012-final.pdf
. Accessed January 10, 2014. Citeseer.
2. Bosma, W., Cannon, J., & Playoust, C. (1997). The Magma algebra system I: The user language. Journal of Symbolic Computation, 24(3–4), 235–265.
3. Cao, W., Hu, L., Ding, J., et al. (2011). Kipnis-shamir attack on unbalanced oil-vinegar scheme. In F. Bao & J. Weng (Eds.), Information security practice and experience (pp. 168–180). Berlin: Springer.
4. Chen, X., Zhang, F., Susilo, W., & Mu, Y. (2007). Efficient generic on-line/off-line signatures without key exposure. In J. Katz & M. Yung (Eds.), Applied cryptography and network security (pp. 18–30). Berlin: Springer.
5. Ding, J., Schmidt, D. (2005). Rainbow, a new multivariable polynomial signature scheme. In J. Ioannidis, A. Keromytis, & M. Yung (Eds.), Applied cryptography and network security (pp. 164–175). Berlin: Springer.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献