Author:
Petzoldt Albrecht,Chen Ming-Shing,Yang Bo-Yin,Tao Chengdong,Ding Jintai
Publisher
Springer Berlin Heidelberg
Reference31 articles.
1. Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.): Post Quantum Cryptography. Springer, Heidelberg (2009)
2. Bernstein, D.J., Duif, N., Lange, T., Schwabe, P., Yang, B.-Y.: High-speed high-security signatures. J. Cryptographic Eng. 2(2), 77–89 (2012)
3. Bernstein, D.J., Lange, T. (eds.): eBACS: ECRYPT Benchmarking of Cryptographic Systems.
http://bench.cr.yp.to
. Accessed 14 May 2014
4. Bettale, L., Faugère, J.C., Perret, L.: Hybrid approach for solving multivariate systems over finite fields. J. Math. Cryptol. 3, 177–197 (2009)
5. Lecture Notes in Computer Science;A Bogdanov,2008
Cited by
94 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Towards Building Quantum Resistant Blockchain;2023 International Conference on Electrical, Computer and Energy Technologies (ICECET);2023-11-16
2. Multivariate Aggregate and Multi-signature Scheme;Cryptology and Network Security with Machine Learning;2023-10-18
3. A Multivariate Convertible Group Signature Scheme;SN Computer Science;2023-09-27
4. Cryptographic Primitives;Advances in Information Security;2023-08-10
5. Revisiting algebraic attacks on MinRank and on the rank decoding problem;Designs, Codes and Cryptography;2023-07-19