|
1 Tsutomu Matsumoto and Hideki Imai. Public Quadratic Polynomial-Tuples for Effcient Signature-Verication and Message-Encryption. In Advances in Cryptology -EUROCRYPT '88, Workshop on the Theory and Application of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings, pages 419-453, 1988. 2 Benny Applebaum, Naama Haramaty, Yuval Ishai, Eyal Kushilevitz and Vinod Vaikuntanathan.Low-Complexity Cryptographic Hash Functions, 2017. 3 Ming-Shing Chen, Andreas Hulsing, Joost Rijneveld, Simona Samardjiska, and Peter Schwabe. From 5-pass MQ-based identication to MQ-based signatures. Advances in Cryptology - ASIACRYPT 2016, LNCS 10032, pp. 135-165, Springer, 2016. 4 M. R. Garey and David S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness, 1979. 5 Aviad Kipnis, Jacques Patarin and Louis Goubin. Unbalanced Oil and Vinegar Signature Schemes, 1999. 6 Aviad Kipnis and Adi Shamir. Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization, 1999. 7 Johannes Blomer, Richard Karp, and EmoWelzl. The rank of sparese random matrices over nite elds, 1997. |