Book Cover
Book
Author Ding, Jintai.

Title Multivariate public key cryptosystems / by Jintai Ding, Jason E. Gower and Dieter S. Schmidt
Published New York, N.Y. ; [London] : Springer, [2006]
©2006

Copies

Location Call no. Vol. Availability
 W'PONDS  005.82 Din/Mpk  AVAILABLE
Description xviii, 260 pages : illustrations ; 25 cm
Series Advances in information security ; 25
Advances in information security ; 25
Contents Machine derived contents note: 1. OVERVIEW I -- .1 Public Key Cryptosystems 1 -- 1.2 Multivariate Public Key Cryptosystems 2 -- 1.3 Basic Security and Efficiency Assumptions 7 -- 14 Early Attempts 8 -- 1.5 Quadratic Constructions 9 -- 2. MATSUMOTO-IMAI CRYPTOSYSTEMS 11 -- 2.1 Construction of a Matsurnmoto-Imai System 12 -- 2.2 Key Size and Efficiency of MI 19 -- 2.3 Linearization Equations Attack 20 -- 2.4 Another Attack on Matsumoto-Imai 34 -- 2.5 Matsumoto-Imai Variants 44 -- 2.6 The Security of the Matsumoto-Imai Variants 52 -- 3. OIL-VINEGAR SIGNATURE SCHEMES 63 -- 3 1 The Basic Oil-Vinegar Signature Scheme 64 -- 3.2 Cryptanalysis of the Oil-Vinegar schemes 69 -- 3.3 Rainbow: Multilayer Unbalanced Oil-Vinegar 88 -- 3.4 Security Analysis of Rainbow 91 -- 3.5k Comparison with other Multivariate Signature Schemes 94 -- 3.6 Optimization and Generalization of Rainbow 96 -- 4. HIDDEN FIELD EQUATIONS 99 -- 4.1 Basic HFE 100 -- 4.2 Attacks on HFE 104 -- 413 Variants of HFE 105 -- 4.4 Cryptanalysis of HFEv 108 -- 5. INTERNAL PERTURBATION 113 -- 5.1 Internal Perturbation of the MI Cryptosystem 114 -- 5.2 Differential Attack on PMI 120 -- 5.3 Inoculation Against Differential Attacks 125 -- 5.4 Perturbation of HFE 132 -- 5.5 Internal Perturbation and Related Work 135 -- 6. TRIANGULAR SCHEMES 137 -- 6 1 The Jacobian Conjecture and Tame Transformations 137 -- 6 2 Basic TTM Cryptosystems 139 -- 6.3 The MinRank Attack on TPM & TTM 146 -- 6.4 Another Attack on the First TTM Cryptosystem 151 -- 6.5 Attacks on the New TTM Cryptosystems 156 -- 6.6 Triangular Signature Schemes 170 -- 6.7 Further Generalizations of Triangular Maps 189 -- 6.8 Other Related Work 190 -- 7. DIRECT ATTACKS 191 -- 7.1 Basic Results from Algebraic Geometry 193 -- 7.2 Grobner Bases 194 -- 7.3 Faugre's Algorithms F4 and Fs 213 -- 7.4 The XL method 220 -- 7.5 Connections Between XL and Grobner Bases 223 -- 7 6 The Zhuang-Zi Algorithm 225 -- 8 FUTURE RESEARCH 233 -- 8.1 Construction of MPKCs 233 -- 8.2 Attack on MPKGs and Provable Security 238 -- 8 3 Practical Applications 240 -- 8. Underlying Mathematics 241
Bibliography Includes bibliographical references and index
Subject Computer security.
Computers -- Access control.
Data encryption (Computer science)
Author Gower, Jason E.
Schmidt, Dieter S.
LC no. 2006285715
ISBN 0387322299 (hbk.)
0387369465 (e-book)
9780387322292 (hbk.)
9780387369464 (ebook)