This note describes attacks on the UOV-based signature scheme called MQ-Sign. In more detail, it presents a polynomial-time key-recovery attack on the variants MQ-Sign-RS and MQ-Sign-SS and an improved direct attack on the variant MQ-Sign-SR. The scheme is a first-round candidate in the Korean Post-Quantum Cryptography Competition. Our attack exploits the sparsity of the secret central polynomials in combination with the specific structure of the secret linear map $S$. We provide a verification script for the polynomial-time attack, that recovers the secret key in less than seven seconds for security level V. Furthermore, we added an implementation of the non-guessing part of the direct attack, confirming our complexity estimates
\u3cp\u3eThis paper presents MQDSS, the first signature scheme with a security reduction based on th...
This paper presents MQDSS, the first signature scheme with a security reduction based on the problem...
This paper presents MQDSS, the first signature scheme with a security reduction based on the problem...
Abstract. We investigate the security of the family of MQQ public key cryptosystems using multivari-...
Most Multivariate Quadratic (MQ) signature schemes have a very large public key, which makes them un...
In this paper, we investigate the security of Rainbow and Unbalanced Oil-and-Vinegar (UOV) signature...
In PQCrypto 2013 Yasuda, Takagi and Sakurai proposed an interesting signature scheme of efficiency $...
One of the most efficient post-quantum signature schemes is Rainbow whose harness is based on the mu...
Abstract. Multivariate public key cryptography which relies on MQ (Multivariate Quadratic) problems ...
This paper presents MQ on my Mind (MQOM), a digital signature scheme based on the difficulty of solv...
Security of public key schemes in a post-quantum world is a challenging task as both RSA and ECC wil...
In this paper we show that solving systems coming from the public key of the Unbalanced Oil and Vine...
A rogue certificate authority (RCA) is a dishonest entity that has the trust of web browsers and use...
A rogue certificate authority (RCA) is a dishonest entity that has the trust of web browsers and use...
A rogue certificate authority (RCA) is a dishonest entity that has the trust of web browsers and use...
\u3cp\u3eThis paper presents MQDSS, the first signature scheme with a security reduction based on th...
This paper presents MQDSS, the first signature scheme with a security reduction based on the problem...
This paper presents MQDSS, the first signature scheme with a security reduction based on the problem...
Abstract. We investigate the security of the family of MQQ public key cryptosystems using multivari-...
Most Multivariate Quadratic (MQ) signature schemes have a very large public key, which makes them un...
In this paper, we investigate the security of Rainbow and Unbalanced Oil-and-Vinegar (UOV) signature...
In PQCrypto 2013 Yasuda, Takagi and Sakurai proposed an interesting signature scheme of efficiency $...
One of the most efficient post-quantum signature schemes is Rainbow whose harness is based on the mu...
Abstract. Multivariate public key cryptography which relies on MQ (Multivariate Quadratic) problems ...
This paper presents MQ on my Mind (MQOM), a digital signature scheme based on the difficulty of solv...
Security of public key schemes in a post-quantum world is a challenging task as both RSA and ECC wil...
In this paper we show that solving systems coming from the public key of the Unbalanced Oil and Vine...
A rogue certificate authority (RCA) is a dishonest entity that has the trust of web browsers and use...
A rogue certificate authority (RCA) is a dishonest entity that has the trust of web browsers and use...
A rogue certificate authority (RCA) is a dishonest entity that has the trust of web browsers and use...
\u3cp\u3eThis paper presents MQDSS, the first signature scheme with a security reduction based on th...
This paper presents MQDSS, the first signature scheme with a security reduction based on the problem...
This paper presents MQDSS, the first signature scheme with a security reduction based on the problem...