References(39)
[1]
Diffie W. and Hellman M. E., New directions in cryptography, IEEE Trans. on Info. Theory, vol. 22, no. 6, pp. 644-654, 1976.
[2]
Law L., Menezes A., Qu M., Solinas J., and Vanstone S., An efficient protocol for authenticated key agreement, Designs, Codes and Cryptography, vol. 28, no. 2, pp. 119-134, 2003.
[3]
Hu K., Xue J., Hu C., Ma R., and Li Z., An improved ID-based group key agreement protocol, Tsinghua Science and Technology, vol. 19, no. 5, pp. 421-428, 2014.
[4]
Shor P. W., Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM J. Computer, vol. 26, no. 5, pp. 1484-1509, 1997.
[5]
Bernstein D. J., Buchmann J., and Dahmen E., Post-Quantum Cryptography. Springer-Verlag, 2009.
[6]
Ding J. T., Gower J. E., and Schmidt D. S., Multivariate Public Key Cryptosystems. Springer-Verlag, 2006.
[7]
Garey M. R. and Johnson D. S., Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman, 1979.
[8]
Patarin J. and Goubin L., Trapdoor one-way permutations and multivariate polynomials, in Proc. ICICS1997, 1997, pp. 356-368.
[9]
Berbain C., Gilbert H., and Patarin J., QUAD: A practical stream cipher with provable security, in Proc. EUROCRYPT2006, 2006, pp. 109-128.
[10]
Wang H. Z., Zhang H. G., and Wu Q. H., Design theory and method of multivariate hash function, SCIENCE CHINA Information Sciences, no. 10, pp. 1977-1987, 2010.
[11]
Sakumoto K., Shirai T., and Hiwatari H., Public-key identification schemes based on multivariate quadratic polynomials, in Proc. CRYPTO2011, 2011, pp. 706-723.
[12]
Billet O. and Gilles M. R., Cryptanalysis of the square cryptosystems, in Proc. ASIACRYPT 2009, 2009, pp. 451-468.
[13]
Dubois V., Fouque P. A., Shamir A., and Stern J., Practical cryptanalysis of SFLASH, in Proc. Crypto2007, 2007, pp. 1-12.
[14]
Goubin L. and Courtois N. T., Cryptanalysis of the TTM cryptosystem, in Proc. ASIACRYPT2000, 2000, pp. 44-57.
[15]
Tao C. D., Diene A., Tang S. H., and Ding J. T., A simple matrix scheme for encryption, in PQC2013, 2013, pp. 231-242.
[16]
Wang H. Z. and Zhang H. G., Extended multivariate public key cryptosystems with secure encrytion fuction, SCIENCE CHINA Information Sciences, no. 6, pp. 1161-1171, 2011.
[17]
Sakumoto K., Shirai T., and Hiwatari H., On provable security of UOV and HFE signature schemes against Chosen-Message attack, in Proc. PQC2011, 2011, pp. 68-82.
[18]
Anshel I., Anshel M., and Goldfeld D., An algebraic method for public-key cryptography, Math Research Letters, 1999, vol. 6, no. 3, pp. 287-291
[19]
Anshel I., Anshel M., and Goldfeld D., New key agreement protocols in braid group cryptography, in Proc. CT-RSA2001, 2001, pp. 1-15
[20]
Myasnikov A., Shpilrain V., and Ushakov A., A practical attack on a Braid group based cryptographic protocol, in Proc. Crypto2005, 2005, pp. 86-96.
[21]
Myasnikov A. and Ushakov A., Length based attack and Braid groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key exchange protocol, in Proc. PKC2007, 2007, pp. 76-88
[22]
Ko K., Lee S., Cheon J., Han J., Kang J., and Park C., New pulic-key cryptosystem using Braid groups, in Proc. Crypto2000, 2000, pp. 166-183.
[23]
Cheon J. H. and Jun B., A polynomial time algorithm for the Braid Diffie-Hellman conjugacy problem, in Proc. Crypto2003, 2003, pp. 212-215.
[24]
Boucher D., Gaborit P., Geiselmann W., Ruatta O., and Ulmer F., Key exchange and encryption schemes based on non-commutative skew polynomials, in Proc. PQCrypto2010, 2010, pp. 126-141.
[25]
Dubois V. and Kammerer J. G., Cryptanalysis of cryptosystems based on non-commutative skew polynomials, in Proc. PKC 2011, 2011, pp. 459-472.
[26]
Bennett C. H. and Brassard G., An update on quantum cryptography, in Proc. CRYPTO1984, 1984, pp. 475-480.
[27]
Bennett C., Quantum cryptography using any two nonorthoganol states, Phys. Rev. Lett., vol. 68, no. 21, pp. 3121-3124, 1992.
[28]
Matsumoto T. and Imai H., Public quadratic polynomial-tuples for efficient signature verification and message encryption, in Proc. EUROCRYPT1988, 1988, pp. 419-453.
[29]
Patarin J., Hidden field equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms, in Proc. EUROCRYPT1996, 1996, pp. 33-48.
[30]
Bouillaguet C., Faugère J. C., Fouque P. A., and Perret L., Practical cryptanalysis of the identification scheme based on the isomorphism of polynomial with one secret problem, in Porc. PKC2011, 2011, pp. 473-493.
[31]
Francoise L. and Ludovic F., Polynomial equivalence problems and applications to multivariate cryptosystems, in Proc. INDOCRYPT 2003, 2003, pp. 235-251.
[32]
Lin D., Faugère J. C., Perret L., and Wang T., On enumeration of polynomial equivalence classes and their application to MPKC, Finite Fields and Their Applications, vol. 18, no. 2, pp. 283-302, 2012.
[33]
Faugère J. C. and Perret L., Polynomial equivalence problems: Algorithmic and theoretical aspects, in Proc. EUROCRYPT2006, 2006, pp. 30-47.
[34]
Fouque P. A., Macario-Rat G., and Stern J., Key recovery on hidden monomial multivariate schemes, in Proc. EUROCRYPT2008, 2008, pp. 19-30.
[35]
Patarin J., Goubin L., and Courtois N., Improved algorithms for isomorphisms of polynomials, in Proc. EUROCRYPT1998, 1998, pp. 184-200.
[36]
Katz J. and Lindell Y., Introduction to Modern Cryptography. Chapman & Hall/CRC, 2007.
[37]
Courtois N. and Pieprzyk J., Cryptanalysis of block ciphers with overdefined systems of equations, in Proc. Asiacrypt 2002, 2002, pp. 267-287.
[38]
Jin H., Struction of matrices space exchangeable for given matrix, Mathematical Theory and Applications, vol. 21, no. 3, pp. 40-44, 2001.
[39]
Akkar M. and Courtois, N, A fast and secure implementation of SFLASH, in Proc. PKC2003, 2003, pp. 267-278.