Description |
xviii, 260 pages : illustrations ; 25 cm |
Series |
Advances in information security ; 25 |
|
Advances in information security ; 25
|
Contents |
Machine derived contents note: 1. OVERVIEW I -- .1 Public Key Cryptosystems 1 -- 1.2 Multivariate Public Key Cryptosystems 2 -- 1.3 Basic Security and Efficiency Assumptions 7 -- 14 Early Attempts 8 -- 1.5 Quadratic Constructions 9 -- 2. MATSUMOTO-IMAI CRYPTOSYSTEMS 11 -- 2.1 Construction of a Matsurnmoto-Imai System 12 -- 2.2 Key Size and Efficiency of MI 19 -- 2.3 Linearization Equations Attack 20 -- 2.4 Another Attack on Matsumoto-Imai 34 -- 2.5 Matsumoto-Imai Variants 44 -- 2.6 The Security of the Matsumoto-Imai Variants 52 -- 3. OIL-VINEGAR SIGNATURE SCHEMES 63 -- 3 1 The Basic Oil-Vinegar Signature Scheme 64 -- 3.2 Cryptanalysis of the Oil-Vinegar schemes 69 -- 3.3 Rainbow: Multilayer Unbalanced Oil-Vinegar 88 -- 3.4 Security Analysis of Rainbow 91 -- 3.5k Comparison with other Multivariate Signature Schemes 94 -- 3.6 Optimization and Generalization of Rainbow 96 -- 4. HIDDEN FIELD EQUATIONS 99 -- 4.1 Basic HFE 100 -- 4.2 Attacks on HFE 104 -- 413 Variants of HFE 105 -- 4.4 Cryptanalysis of HFEv 108 -- 5. INTERNAL PERTURBATION 113 -- 5.1 Internal Perturbation of the MI Cryptosystem 114 -- 5.2 Differential Attack on PMI 120 -- 5.3 Inoculation Against Differential Attacks 125 -- 5.4 Perturbation of HFE 132 -- 5.5 Internal Perturbation and Related Work 135 -- 6. TRIANGULAR SCHEMES 137 -- 6 1 The Jacobian Conjecture and Tame Transformations 137 -- 6 2 Basic TTM Cryptosystems 139 -- 6.3 The MinRank Attack on TPM & TTM 146 -- 6.4 Another Attack on the First TTM Cryptosystem 151 -- 6.5 Attacks on the New TTM Cryptosystems 156 -- 6.6 Triangular Signature Schemes 170 -- 6.7 Further Generalizations of Triangular Maps 189 -- 6.8 Other Related Work 190 -- 7. DIRECT ATTACKS 191 -- 7.1 Basic Results from Algebraic Geometry 193 -- 7.2 Grobner Bases 194 -- 7.3 Faugre's Algorithms F4 and Fs 213 -- 7.4 The XL method 220 -- 7.5 Connections Between XL and Grobner Bases 223 -- 7 6 The Zhuang-Zi Algorithm 225 -- 8 FUTURE RESEARCH 233 -- 8.1 Construction of MPKCs 233 -- 8.2 Attack on MPKGs and Provable Security 238 -- 8 3 Practical Applications 240 -- 8. Underlying Mathematics 241 |
Bibliography |
Includes bibliographical references and index |
Subject |
Computer security.
|
|
Computers -- Access control.
|
|
Data encryption (Computer science)
|
Author |
Gower, Jason E.
|
|
Schmidt, Dieter S.
|
LC no. |
2006285715 |
ISBN |
0387322299 (hbk.) |
|
0387369465 (e-book) |
|
9780387322292 (hbk.) |
|
9780387369464 (ebook) |
|