Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Breaking rainbow takes a weekend on a laptop
W Beullens - Annual International Cryptology Conference, 2022 - Springer
This work introduces new key recovery attacks against the Rainbow signature scheme,
which is one of the three finalist signature schemes still in the NIST Post-Quantum …
which is one of the three finalist signature schemes still in the NIST Post-Quantum …
[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …
publickey cryptographic algorithms through a public, competition-like process. The new …
A new perturbation for multivariate public key schemes such as HFE and UOV
We present here the analysis of a new perturbation, that seems to strengthen significantly
the security of some families of multivariate schemes. Thanks to this new perturbation, we …
the security of some families of multivariate schemes. Thanks to this new perturbation, we …
2F-a new method for constructing efficient multivariate encryption schemes
D Smith-Tone - International Conference on Post-Quantum …, 2022 - Springer
Abstract The Support Minors method of solving the MinRank problem has contributed to
several new cryptanalyses of post-quantum cryptosystems including some of the most …
several new cryptanalyses of post-quantum cryptosystems including some of the most …
A subexponential quantum algorithm for the semidirect discrete logarithm problem
Group-based cryptography is a relatively unexplored family in post-quantum cryptography,
and the so-called Semidirect Discrete Logarithm Problem (SDLP) is one of its most central …
and the so-called Semidirect Discrete Logarithm Problem (SDLP) is one of its most central …
Full post-quantum datagram tls handshake in the internet of things
C McLoughlin, C Gritti, J Samandari - International Conference on Codes …, 2023 - Springer
Quantum computers are a threat to the current standards for secure communication. The
Datagram Transport Layer Security (DTLS) protocol is a common protocol used by Internet …
Datagram Transport Layer Security (DTLS) protocol is a common protocol used by Internet …
New Security Proofs and Techniques for Hash-and-Sign with Retry Signature Schemes
B Cogliati, PA Fouque, L Goubin… - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Abstract Hash-and-Sign with Retry is a popular technique to design efficient signature
schemes from code-based or multivariate assumptions. Contrary to Hash-and-Sign …
schemes from code-based or multivariate assumptions. Contrary to Hash-and-Sign …
Refined f5 algorithms for ideals of minors of square matrices
We consider the problem of computing a grevlex Gröbner basis for the set Fr (M) of minors of
size r of an n× n matrix M of generic linear forms over a field of characteristic zero or large …
size r of an n× n matrix M of generic linear forms over a field of characteristic zero or large …
State of the Art of HFE Variants: Is It Possible to Repair HFE with Appropriate Modifiers?
B Cogliati, G Macariot-Rat, J Patarin… - … Conference on Post …, 2024 - Springer
Abstract (that stands for Hidden Field Equations) belongs to multivariate cryptography and
was designed by Jacques Patarin in 1996 as a public key trapdoor suitable for encryption or …
was designed by Jacques Patarin in 1996 as a public key trapdoor suitable for encryption or …
Improved Cryptanalysis of HFERP
M Cartor, R Cartor, H Furue, D Smith-Tone - … International Conference on …, 2024 - Springer
In this paper we introduce a new attack on the multivariate encryption scheme HFERP, a big
field scheme including an extra variable set, additional equations of the UOV or Rainbow …
field scheme including an extra variable set, additional equations of the UOV or Rainbow …