Preview
Unable to display preview. Download preview PDF.
References
Diffie, W. and Hellman, M.E.: “New directions in cryptography,” IEEE Trans. on Information Theory, Vol.IT-22, No.6, pp.644–654 (Nov. 1976).
Rivest, R.L., Shamir, A. and Adleman, L.: “A method of obtaining digital signatures and public key cryptosystems,” Comm. ACM, Vol.21, No.2, pp.120–126 (Feb.1978).
McEliece,R.: “A public key cryptosystem based on algebraic coding theory,” DSN Progress Rep.42–44, Jet Propulsion Lab. Calif.Inst.of Tech. (Jan.,Feb. 1978).
Matsumoto,T. and Imai,H.: “A new algorithm for public-key crypto-system,” Paper of Technical Group, TGIT82-24, IECE Japan (Aug. 1982) (in Japanese).
Matsumoto,T. and Imai,H.: “A public-key cryptosystem based on polynomials over finite fields of characteristic 2,” Proc.of the 5th Symposium on Information Theory and its Applications, pp.372–379 (Oct. 1982) (in Japanese).
Matsumoto,T.: “Mathematical cryptography and security of communication networks,” Thesis for M.E., Yokohama National University (Mar. 1983)(in Japanese).
Matsumoto,T. and Imai.H.: “A class of asymmetric cryptosystems based on polynomials over finite rings,” 1983 IEEE International Symposium on Information Theory, Abstract of Papers, pp.131–132 (Sept. 1983).
Matsumoto,T., Imai,H., Harashima,H. and Miyakawa,H.: “Asymmetric cryptosystems using obscure representations of enciphering functions,” 1983 Natl. Conf. Rec. on Inf. Syst., IECE Japan, S8-5 (Sept. 1983) (in Japanese).
Matsumoto,T., Imai,H., Harashima,H. and Miyakawa,H.:“An asymmetric bijective cryptosystem using a system of polynomials in several indeterminates as a public key,” Proc.of the 6th Symposium on Information Theory and its Applications, pp.263–268 (Nov. 1983) (in Japanese).
Matsumoto,T., Imai,H., Harashima,H. and Miyakawa,H.:“An asymmetric bijective cryptosystem with public multivariate polynomials over GF(2),” Paper of Technical Group, TGAL83-77, IECE Japan (Mar. 1984) (in Japanese).
Delsarte,P., Desmedt,Y., Odlyzko,A. and Piret,P.: “Fast crypt-analysis of the Matsumoto-Imai public key scheme,” presented at EURO CRYPTO 84 (Apr. 1984).
Matsumoto,T., Imai,H., Harashima,H. and Miyakawa,H.: “A high-speed asymmetric cryptosystem with obscure public-keys,” Paper of Technical Group, TGAL84-83 (Mar. 1985)(in Japanese).
Matsumoto,T., Imai,H., Harashima,H. and Miyakawa,H.: “A cryptographically useful theorem on the connection between uni and multivariate polynomials,” Trans. IECE Japan, Vol.E68, No.3 (Mar. 1985).
Takeuchi,M. and Kaneko,T.: “An improved public-key cryptosystem using Galois extension ring GR(2m,k),” 1985 Natl.Conf.Rec., IECE Japan, 1442 (Mar. 1985)(in Japanese).
Matsumoto,T., Imai,H., Harashima,H. and Miyakawa,H.: “Asymmetric cryptosystems based on obscure representations over finite non-commutative groups,” Paper of Technical Group, TGCS85-28, IECE Japan (June 1985)(in Japanese).
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1986 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Imai, H., Matsumoto, T. (1986). Algebraic methods for constructing asymmetric cryptosystems. In: Calmet, J. (eds) Algebraic Algorithms and Error-Correcting Codes. AAECC 1985. Lecture Notes in Computer Science, vol 229. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-16776-5_713
Download citation
DOI: https://doi.org/10.1007/3-540-16776-5_713
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-16776-1
Online ISBN: 978-3-540-39855-4
eBook Packages: Springer Book Archive