Multi-HFE (Chen et al., 2009) is one of cryptosystems whose public key is a set of multivariate quadratic forms over a finite field. Its quadratic forms are constructed by a set of multivariate quadratic forms over an extension field. Recently, Bettale et al. (2013) have studied the security of HFE and multi-HFE against the min-rank attack and found that multi-HFE is not more secure than HFE of similar size. In the present paper, we propose a new attack on multi-HFE by using a diagonalization approach. As a result, our attack can recover equivalent secret keys of multi-HFE in polynomial time for odd characteristic case. In fact, we experimentally succeeded to recover equivalent secret keys of several examples of multi-HFE in about fifteen s...
International audienceIn this paper, we review and explain the existing algebraic cryptanalysis of m...
Abstract. In this paper, we review and explain the existing algebraic cryptanalysis of multivariate ...
This note was originally written under the name ``On the Security of HMFEv\u27\u27 and was submitted...
Multi-HFE (Chen et al., 2009) is one of cryptosystems whose public key is a set of multivariate quad...
International audienceWe investigate in this paper the security of HFE and Multi-HFE schemes as well...
Often times, the ability to distinguish between random data and a public key can leads to an attack ...
International audienceWe investigate the security of a generalization of HFE (multivariate and odd-c...
The HFE (hidden field equations) cryptosystem is one of the most interesting public-key multivariate...
The HFEv- signature scheme is one of the most studied multivariate schemes and one of the major cand...
Abstract. In this paper, we review and explain the existing algebraic cryptanalysis of multivariate ...
Some results on cryptanalysis of Hidden Field Equations (HFE) cryptosystem over odd-characteristic fi...
Colloque avec actes et comité de lecture. internationale.International audienceIn this paper, we rev...
Multivariate Cryptography can be defined as public key cryptography based on the computational hardn...
Most public key cryptosystems used in practice are based on integer factorization or discrete logari...
We present here new multivariate schemes that can be seen as HFE generalization having a property ca...
International audienceIn this paper, we review and explain the existing algebraic cryptanalysis of m...
Abstract. In this paper, we review and explain the existing algebraic cryptanalysis of multivariate ...
This note was originally written under the name ``On the Security of HMFEv\u27\u27 and was submitted...
Multi-HFE (Chen et al., 2009) is one of cryptosystems whose public key is a set of multivariate quad...
International audienceWe investigate in this paper the security of HFE and Multi-HFE schemes as well...
Often times, the ability to distinguish between random data and a public key can leads to an attack ...
International audienceWe investigate the security of a generalization of HFE (multivariate and odd-c...
The HFE (hidden field equations) cryptosystem is one of the most interesting public-key multivariate...
The HFEv- signature scheme is one of the most studied multivariate schemes and one of the major cand...
Abstract. In this paper, we review and explain the existing algebraic cryptanalysis of multivariate ...
Some results on cryptanalysis of Hidden Field Equations (HFE) cryptosystem over odd-characteristic fi...
Colloque avec actes et comité de lecture. internationale.International audienceIn this paper, we rev...
Multivariate Cryptography can be defined as public key cryptography based on the computational hardn...
Most public key cryptosystems used in practice are based on integer factorization or discrete logari...
We present here new multivariate schemes that can be seen as HFE generalization having a property ca...
International audienceIn this paper, we review and explain the existing algebraic cryptanalysis of m...
Abstract. In this paper, we review and explain the existing algebraic cryptanalysis of multivariate ...
This note was originally written under the name ``On the Security of HMFEv\u27\u27 and was submitted...