共 14 条
- [1] Shor P., Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM Journal on Computing, 26, 5, pp. 1484-1509, (1997)
- [2] Moh T.T., A fast public key system with signature and master key functions, Comm in Algebra, 27, pp. 2207-2222, (1999)
- [3] Wang L.-C., Yang B.-Y., Hu Y.-H., Et al., A Medium-field multivariate public key encryption scheme, CT-RSA 2006: Proceedings of the Cryptographers' Track at the RSA Conference 2006, LNCS 3860, pp. 132-149, (2006)
- [4] Wang L.-C., Chang F.-H., Tractable rational map cryptosystem
- [5] Goubin L., Courtois N.T., Cryptanalysis of the TTM cryptosystem, ASIACRYPT 2000: Proceedings of 6th International Conference on the Theory and Application of Cryptology and Information Security 2000, LNCS 1976, pp. 44-57, (2000)
- [6] Chen J.-M., Moh T.T., On the goubin-courtois attack on TTM
- [7] Ding J.-T., Schmidt D., The new TTM implementation is not secure, Progress in Computer Science and Applied Logic, 23, pp. 113-128, (2003)
- [8] Moh T.T., Chen J.-M., Yang B.-Y., Building instances of TTM immune to the goubin-courtois attack and the ding-schmidt
- [9] Nie X.-Y., Hu L., Li J.-Y., Et al., Breaking a new instance of ttm cryptosystem, ACNS 2006: Proceedings of Third International Conference Applied Cryptography and Network Security, LNCS 3989, pp. 210-225, (2006)
- [10] Patarin J., Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt'88, Crypto'95: Proceedings of 15th Annual International Cryptology Conference, LNCS 963, pp. 248-261, (1995)