A signature scheme based on multivariate quadratic equations, Rainbow, was selected as one of digital signature finalists for NIST Post-Quantum Cryptography Standardization Round 3. In this paper, we provide efficient implementations of Rainbow and UOV using the AVX2 instruction set. These efficient implementations include several optimizations for signing to accelerate solving linear systems and the Vinegar value substitution. We propose a new block matrix inversion (BMI) method using the Lower-Diagonal-Upper decomposition of blocks matrices based on the Schur complement that accelerates solving linear systems. Compared to UOV implemented with Gaussian elimination, our implementations with the BMI result in speedups of 12.36%, 24.3%, and 3...
Multivariate public key cryptography is one of the main approaches to guarantee the security of comm...
© The Institution of Engineering and Technology 2019 Multivariate public key cryptography is one of ...
This note describes attacks on the UOV-based signature scheme called MQ-Sign. In more detail, it pr...
A signature scheme based on multivariate quadratic equations, Rainbow, was selected as one of digita...
Hard lattice problems are predominant in constructing post-quantum cryptosystems. However, we need t...
In this paper, we investigate the security of Rainbow and Unbalanced Oil-and-Vinegar (UOV) signature...
One of the most efficient post-quantum signature schemes is Rainbow whose harness is based on the mu...
Rainbow signature is one of the finalist in National Institute of Standards and Technology (NIST) st...
Cryptographic techniques are essential for the security of communication in modern society. As more ...
Currently the National Institute of Standards and Technology (NIST) is engaged in a post-quantum sta...
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014Internatio...
Most Multivariate Quadratic (MQ) signature schemes have a very large public key, which makes them un...
Thanks to the research progress, quantum computers are slowly becoming a reality, and some companies...
Security of public key schemes in a post-quantum world is a challenging task as both RSA and ECC wil...
Systems of Multivariate Quadratic Equations (\mathcalMQ) are important in cryptography due to the re...
Multivariate public key cryptography is one of the main approaches to guarantee the security of comm...
© The Institution of Engineering and Technology 2019 Multivariate public key cryptography is one of ...
This note describes attacks on the UOV-based signature scheme called MQ-Sign. In more detail, it pr...
A signature scheme based on multivariate quadratic equations, Rainbow, was selected as one of digita...
Hard lattice problems are predominant in constructing post-quantum cryptosystems. However, we need t...
In this paper, we investigate the security of Rainbow and Unbalanced Oil-and-Vinegar (UOV) signature...
One of the most efficient post-quantum signature schemes is Rainbow whose harness is based on the mu...
Rainbow signature is one of the finalist in National Institute of Standards and Technology (NIST) st...
Cryptographic techniques are essential for the security of communication in modern society. As more ...
Currently the National Institute of Standards and Technology (NIST) is engaged in a post-quantum sta...
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014Internatio...
Most Multivariate Quadratic (MQ) signature schemes have a very large public key, which makes them un...
Thanks to the research progress, quantum computers are slowly becoming a reality, and some companies...
Security of public key schemes in a post-quantum world is a challenging task as both RSA and ECC wil...
Systems of Multivariate Quadratic Equations (\mathcalMQ) are important in cryptography due to the re...
Multivariate public key cryptography is one of the main approaches to guarantee the security of comm...
© The Institution of Engineering and Technology 2019 Multivariate public key cryptography is one of ...
This note describes attacks on the UOV-based signature scheme called MQ-Sign. In more detail, it pr...