ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
17
views
9
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,822
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Public Key Cryptography - PKC 2005
Large Superfluous Keys in $\mathcal{M}\(ultivariate \)\mathcal{Q}$ uadratic Asymmetric Systems
other
Author(s):
Christopher Wolf
,
Bart Preneel
Publication date
(Print):
2005
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Socioecological systems
Most cited references
9
Record
: found
Abstract
: not found
Article
: not found
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
Peter W. Shor
(1997)
0
comments
Cited
255
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
Jacques Patarin
(1996)
0
comments
Cited
49
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption
Tsutomu Matsumoto
,
Hideki Imai
(1988)
0
comments
Cited
37
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2005
Pages
: 275-287
DOI:
10.1007/978-3-540-30580-4_19
SO-VID:
b8ec17be-47a5-4d0c-bfb3-da99a8996461
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 275
Large Superfluous Keys in $\mathcal{M}\(ultivariate \)\mathcal{Q}$ uadratic Asymmetric Systems
pp. 154
Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order
pp. 362
Improved Identity-Based Signcryption
pp. 380
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption
pp. 398
CBE from CL-PKE: A Generic Construction and Efficient Schemes
pp. 416
A Verifiable Random Function with Short Proofs and Keys
Similar content
1,822
Superfluous Amylase/Lipase Testing at a University-Affiliated Teaching Hospital: A Retrospective Review
Authors:
Muhammad Baraa Hammami
,
Milad Khoury
,
Sachin S Sule
…
Revealing the unfavorable role of superfluous CH
3
NH
3
PbI
3
grain boundary traps in perovskite solar cells on carrier collection
Authors:
Yangyang Du
,
Hongkun Cai
,
Hongbin Wen
…
SUPERFLUOUS INFORMATION, EPISTEMIC CONDITIONS OF INFERENCE, AND BEGGING THE QUESTION
Authors:
DavidH. Sanford
See all similar
Cited by
2
Small Public Keys and Fast Verification for $\mathcal{M}\(ultivariate \)\mathcal{Q}$ uadratic Public Key Systems
Authors:
Albrecht Petzoldt
,
Enrico Thomae
,
Stanislav Bulygin
…
An Existential Unforgeable Signature Scheme Based on Multivariate Quadratic Equations
Authors:
Kyung-Ah Shim
,
Cheol-Min Park
,
Namhun Koo
See all cited by