Progress in multivariate cryptography: Systematic review, challenges, and research directions

J Dey, R Dutta - ACM Computing Surveys, 2023 - dl.acm.org
Multivariate Public Key Cryptosystem (MPKC) seem to be promising toward future digital
security even in the presence of quantum adversaries. MPKCs derive their security from the …

A comprehensive survey of cryptography key management systems

S Rana, FK Parast, B Kelly, Y Wang, KB Kent - Journal of Information …, 2023 - Elsevier
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …

[หนังสือ][B] Report on post-quantum cryptography

L Chen, L Chen, S Jordan, YK Liu, D Moody, R Peralta… - 2016 - nvlpubs.nist.gov
In recent years, there has been a substantial amount of research on quantum computers–
machines that exploit quantum mechanical phenomena to solve mathematical problems that …

High-speed high-security signatures

DJ Bernstein, N Duif, T Lange, P Schwabe… - Journal of cryptographic …, 2012 - Springer
This paper shows that a $390 mass-market quad-core 2.4 GHz Intel Westmere (Xeon
E5620) CPU can create 109000 signatures per second and verify 71000 signatures per …

[หนังสือ][B] Handbook of finite fields

GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …

Nist post-quantum cryptography-a hardware evaluation study

K Basu, D Soni, M Nabeel, R Karri - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Experts forecast that quantum computers can break classical cryptographic algorithms.
Scientists are develo** post quantum cryptographic (PQC) algorithms, that are …

[PDF][PDF] GeMSS: a great multivariate short signature

A Casanova, JC Faugere, G Macario-Rat, J Patarin… - 2017 - inria.hal.science
1 Introduction sparkling GeMSS spring up from the night sky a dazzling splendor to ever
beautify sequined glories that verily eye smack sparkling GeMSS spring up from night sky …

[หนังสือ][B] Multivariate public key cryptosystems

J Ding, JE Gower, DS Schmidt - 2006 - books.google.com
Multivariate public key cryptosystems (MPKC) is a fast-develo** new area in cryptography.
In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative …

Cybersecurity challenges associated with the internet of things in a post-quantum world

OS Althobaiti, M Dohler - Ieee Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is an emerging networking paradigm connecting billions of
devices securely to the Internet. Another emerging paradigm is quantum computing which …

Hybrid approach for solving multivariate systems over finite fields

L Bettale, JC Faugere, L Perret - Journal of Mathematical Cryptology, 2009 - degruyter.com
In this paper, we present an improved approach to solve multivariate systems over finite
fields. Our approach is a tradeoff between exhaustive search and Gröbner bases …