1. [1] I. Anshel, M. Anshel, and D. Goldfeld, “An algebraic method for public-key cryptography,” Math. Res. Lett., vol.6, no.3-4, pp.287-291, 1999.
2. [2] D.J. Bernstein, J. Buchmann, and E. Dahmen, “Post quantum cryptography,” Springer, Heidelberg, AFRICACRYPT'09, Springer LNCS, vol.5580, pp.77-97, 2009.
3. [3] O. Billet and H. Gilbert, “Cryptanalysis of rainbow,” SCN'06, Springer LNCS, vol.4116, pp.336-347, 2006.
4. [4] S. Bulygin, P. Albrecht, and J.A. Buchmann, “Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks,” INDOCRYPT 2010, Springer LNCS, vol.6498, pp.17-32, 2010.
5. [5] N.T. Courtois, “Short signatures, provable security and generic attacks for multivariate polynomial schemes such as HFE, quartz and Sflash,” IACR e-print archive, http://eprint.iacr.org/2004/143.pdf, 2004.