[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

What a lovely hat

Is it made out of tin foil?




Dates are inconsistent

Dates are inconsistent

4 results sorted by ID

Possible spell-corrected query: mq-sign
2014/811 (PDF) Last updated: 2014-10-11
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
Jean-Charles Faugere, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae
Public-key cryptography

We investigate the security of the family of MQQ public key cryptosystems using multivariate quadratic quasigroups (MQQ). These cryptosystems show especially good performance properties. In particular, the MQQ-SIG signature scheme is the fastest scheme in the ECRYPT benchmarking of cryptographic systems (eBACS). We show that both the signature scheme MQQ-SIG and the encryption scheme MQQ-ENC, although using different types of MQQs, share a common algebraic structure that introduces a...

2012/328 (PDF) (PS) Last updated: 2012-06-12
The Multivariate Probabilistic Encryption Scheme MQQ-ENC
Danilo Gligoroski, Simona Samardjiska
Public-key cryptography

We propose a new multivariate probabilistic encryption scheme with decryption errors MQQ-ENC that belongs to the family of MQQ-based public key schemes. Similarly to MQQ-SIG, the trapdoor is constructed using quasigroup string transformations with multivariate quadratic quasigroups, and a minus modifier with relatively small and fixed number of removed equations. To make the decryption possible and also efficient, we use a universal hash function to eliminate possibly wrong plaintext...

2012/223 (PDF) Last updated: 2012-08-11
A Generalization of the Rainbow Band Separation Attack and its Applications to Multivariate Schemes
Enrico Thomae

The Rainbow Signature Scheme is a non-trivial generalization of the well known Unbalanced Oil and Vinegar (UOV) signature scheme (Eurocrypt '99) minimizing the length of the signatures. By now the Rainbow Band Separation attack is the best key recovery attack known. For some sets of parameters it is even faster than a direct attack on the public key. Unfortunately the available description of the attack is very ad hoc and does not provide deep insights. In this article we provide another...

2010/527 (PDF) Last updated: 2010-12-20
The Digital Signature Scheme MQQ-SIG
Danilo Gligoroski, Rune Steinsmo \O deg\aa rd, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski

This document contains the Intellectual Property Statement and the technical description of the MQQ-SIG - a new public key digital signature scheme. The complete scientific publication covering the design rationale and the security analysis will be given in a separate publication. MQQ-SIG consists of $n - \frac{n}{4}$ quadratic polynomials with $n$ Boolean variables where $n=160$, $192$, $224$ or $256$.

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.