Author of the publication

A multivariate quadratic challenge toward post-quantum generation cryptography.

, , , , and . ACM Commun. Comput. Algebra, 49 (3): 105-107 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of NTRU Using Group Rings to Partial Decryption Technique., , and . INTRUST, volume 9565 of Lecture Notes in Computer Science, page 203-213. Springer, (2015)A Security Analysis of Uniformly-Layered Rainbow - Revisiting Sato-Araki's Non-commutative Approach to Ong-Schnorr-Shamir Signature towards PostQuantum Paradigm., and . PQCrypto, volume 7071 of Lecture Notes in Computer Science, page 275-294. Springer, (2011)A Multivariate Encryption Scheme with Rainbow., and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 236-251. Springer, (2015)Upper bound of the length of information embedd in RSA public key efficiently., , , and . AsiaPKC@AsiaCCS, page 33-38. ACM, (2013)Lattice-Based Public Key Cryptosystems Invoking Linear Mapping Mask., , and . ProvSec, volume 13600 of Lecture Notes in Computer Science, page 88-104. Springer, (2022)Multivariate Encryption Schemes Based on the Constrained MQ Problem.. ProvSec, volume 11192 of Lecture Notes in Computer Science, page 129-146. Springer, (2018)Multivariate Encryption Schemes Based on Polynomial Equations over Real Numbers., , and . PQCrypto, volume 12100 of Lecture Notes in Computer Science, page 402-421. Springer, (2020)Parallelization of QUAD Stream Cipher Using Linear Recurring Sequences on Graphics Processing Units., , , and . CANDAR, page 543-548. IEEE Computer Society, (2014)Implementation of Efficient Operations over GF(232) Using Graphics Processing Units., , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 602-611. Springer, (2014)Security Analysis on an ElGamal-Like Multivariate Encryption Scheme Based on Isomorphism of Polynomials., , , and . Inscrypt, volume 13007 of Lecture Notes in Computer Science, page 235-250. Springer, (2021)