In this paper we propose new key agreement protocols based on multivariate algebraic equations. We choose the multivariate function F(X) of high degree on non-commutative quaternion ring H over finite field Fq. Common keys are generated by using the public-key F(X). Our system is immune from the Gröbner bases attacks because obtaining parameters of F(X) to be secret keys arrives at solving the multivariate algebraic equations that is one of NP complete problems .Our protocols are also thought to be immune from the differential attacks and the rank attacks
Multivariate cryptography studies applications of endomorphisms of K[x_1, x_2, …, x_n] where K is ...
We propose BQTRU, a non-commutative NTRU-like cryptosystem over quaternion algebras. This cryptosyst...
Post-Quantum Cryptography studies cryptographic algorithms that quantum computers cannot break. Rece...
We propose the digital signature scheme on non-commutative quaternion ring over finite fields in thi...
I propose the new key distribution system and attribute-based encryption scheme on non-commutative r...
AbstractThe ring signature scheme is an important cryptographic primitive that enables a user to sig...
Polynomial system solving is one of the oldest and most important problems incomputational mathemati...
In this paper we introduce some key exchange protocols over noncommutative rings. These protocols us...
Nowadays cryptographic technologies are widely used in the information society. The theme of this pa...
Polynomial system solving is one of the oldest and most important problems incomputational mathemati...
Multivariate Public Key Cryptosystems (MPKC) can be potentially applied to post-quantum cryptography...
Post-quantum cryptography (PQC) is a trend that has a deserved NIST status, and which aims to be res...
Most public key cryptosystems used in practice are based on integer factorization or discrete logari...
AbstractThe ring signature scheme is an important cryptographic primitive that enables a user to sig...
In Sakumoto et al. (CRYPTO 2011, LNCS, vol 6841. Springer, Berlin, pp 706–723, 2011), presented a ne...
Multivariate cryptography studies applications of endomorphisms of K[x_1, x_2, …, x_n] where K is ...
We propose BQTRU, a non-commutative NTRU-like cryptosystem over quaternion algebras. This cryptosyst...
Post-Quantum Cryptography studies cryptographic algorithms that quantum computers cannot break. Rece...
We propose the digital signature scheme on non-commutative quaternion ring over finite fields in thi...
I propose the new key distribution system and attribute-based encryption scheme on non-commutative r...
AbstractThe ring signature scheme is an important cryptographic primitive that enables a user to sig...
Polynomial system solving is one of the oldest and most important problems incomputational mathemati...
In this paper we introduce some key exchange protocols over noncommutative rings. These protocols us...
Nowadays cryptographic technologies are widely used in the information society. The theme of this pa...
Polynomial system solving is one of the oldest and most important problems incomputational mathemati...
Multivariate Public Key Cryptosystems (MPKC) can be potentially applied to post-quantum cryptography...
Post-quantum cryptography (PQC) is a trend that has a deserved NIST status, and which aims to be res...
Most public key cryptosystems used in practice are based on integer factorization or discrete logari...
AbstractThe ring signature scheme is an important cryptographic primitive that enables a user to sig...
In Sakumoto et al. (CRYPTO 2011, LNCS, vol 6841. Springer, Berlin, pp 706–723, 2011), presented a ne...
Multivariate cryptography studies applications of endomorphisms of K[x_1, x_2, …, x_n] where K is ...
We propose BQTRU, a non-commutative NTRU-like cryptosystem over quaternion algebras. This cryptosyst...
Post-Quantum Cryptography studies cryptographic algorithms that quantum computers cannot break. Rece...