Computer Science ›› 2014, Vol. 41 ›› Issue (Z6): 361-362.
Previous Articles Next Articles
LUO Wen-jun and GONG Shou-peng
[1] Ding Jin-tai,Schmidt D.Multivariable public-key cryptosystems[J].Advances in Information Security,2006,4(10):288-304 [2] Ding Jin-tai.A new Variant of Matsumoto-Imai Cryptosystemthrough Perturbation[J].Public Key Cryptography-PKC,2004,7(12):305-318 [3] Ding Jin-tai,Schmidt D.Rainbow a new Multivariable Polynomial Signature[J].Applied Cryptography and Network Security,2005,1(14) :164-175 [4] Ding Jin-tai,Schmidt D.Cryptanalysis of HFEv and InternalPerturbation of HFE[J].Public key Cryptography-PKC,2005,6(5):288-301 [5] Faugere J C.A new efficient algorithm for computing Grobner bases(F4)[J].Journal of Pure and Applied Algebra,2009(139):61-88 [6] Yang Bo-yin.Public-Key Cryptography from New Multivariate Quadratic Assumptions[J].Informa tion Security,2010(5):193-241 [7] Ding Jin-tai,Hu Lei,Nie Xun-yun,et al.High Order Linearization Equition (HOLLE) Attack on Multivariable Public Key[J].Advances in Information Security,2010(9):126-134 [8] Fouque P A,Granboulan L,Stern J.Differential Cryptanalysisfor Multivariate Scheme[J].Advance In Cryptology EUROCRYPT,2005,4(9):341-353 [9] 王后珍,张焕国,王张宜,等.一类具有安全加密功能的扩展MQ公钥加密体制[J].中国科学,2011,1(11):1297-1309 [10] Yang Bo-yin,Chen Jiun-ming.Building Secure Tame-like Multivariate Public-Key Cryptosystems The New TTS[J].Information Security and Privacy,2005,4(7):518-531 [11] 聂旭云,徐赵虎,廖永建,等.多变量公钥密码扩展方案的安全性分析[J].计算机学报,2013,6(6):1177-1182 [12] 李乔,郑啸.云计算研究现状综述[J].计算机科学,2011,38(4):32-37 |
No related articles found! |
|