최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.33 no.2, 2023년, pp.211 - 222
심경아 (국가수리과학연구소 (공공기반연구본부))
Multivariate quadratic equations (MQ)-based public-key cryptographic algorithms are one of promising post-quantumreplacements for currently used public-key cryptography. After selecting to NIST Post-Quantum Cryptography StandardizationRound 3 as one of digital signature finalists, Rainbow was crypta...
W. Shor, "Polynomial-time algorithms?for prime factorization and discrete?logarithms on a quantum computer",?SIAM J. on Computing, pp.?1484-1509, 1997.
A. Kipnis, J. Patarin, and L. Goubin,?"Unbalanced Oil and Vinegar?signature schemes", Advances in?Cryptology, CRYPTO'99, LNCS 1592,?pp. 206-222, 1999.
J. Ding and D. Schmidt. "Rainbow, a?new multivariable polynomial?signature scheme", Proc. of the?International Conference on Applied?Cryptography and Network Security,?LNCS 3531, pp. 164-175, 2005.
M. Bardet, P. Briaud, M. Bros, P.?Gaborit, V. Neiger, O. Ruatta, and?J-P. Tillich, "An algebraic attack on?rank metric code-based cryptosystems", Advances in Cryptology,?EUROCRYPT 2020, Part III, LNCS?12107, pp. 64-93, 2020.
M. Bardet, M. Bros, D. Cabarcas, P.?Gaborit, R. A. Perlner, D.?Smith-Tone, J-P. Tillich, and J. A.?Verbel, "Improvements of algebraic?attacks for solving the rank decoding?and MinRank problems", Advances in Cryptology, ASIACRYPT 2020, Part I, LNCS 12491, pp. 507-536, 2020.
W. Beullens, "Improved cryptanalysis on UOV and Rainbow", Advances in Cryptology, EUROCRYPT 2021, Part I, LNCS 12696, pp. 348-373, 2021.
D. Smith-Tone and R. Perlner,"Rainbow band separation is better than we thought", IACRePrint2020-702, June 2020.
J. A. Verbel, J. Baena, D. Cabarcas, R. A. Perlner, and D. Smith-Tone,"On the complexity of?superdetermined" minrank instances, Proc. of the International Conferenceon Post-Quantum Cryptography, LNCS 11505, pp. 167-186, 2019.
W. Beullens, "Breaking Rainbow takes a weekend on a laptop", Advances in Cryptology, CRYPTO 2022, Part II, LNCS 13508, pp. 464-479, 2022.
J. Ding, M-S. Chen, A. Petzoldt, D.Schmidt, and B-Y. Yang, "Rainbowtechnical report", National Institute of?Standards and Technology, 2019.
A. Petzoldt, S. Bulygin, andJ.Buchmann, "CyclicRainbow: A multivariate signature scheme with a partially cyclic public key", Proc. of?the International Conference on Cryptology in India, LNCS 6498, pp33-48, 2010.
NIST Computer Security Resource Center, "Post-quantum cryptography,round 2 submissions", https://csrc.nist.gov/ Projects/ Post-QuantumCryptography/Round-2-Submissions, Feb. 3,2023.
W. Beullens and B. Preneel, "Fieldlifting for smaller UOV public keys",Proc. of the International Conferenceon Cryptology in India, LNCS10698, pp. 227-246, 2017.
Z. Peng and S. Tang, "Circulant UOV:?a new UOV variant with shorter?private key and faster signature?generation", KSII Transactions on?Internet and Information Systems?(TIIS), vol. 12, no. 3, pp. 1376-1395,?2018.
Z. Peng and S. Tang, "Circulant?Rainbow: A new Rainbow variant?with shorter private key and faster?signature generation", IEEE Access,?vol. 5, pp. 11877-11886, 2017.
A. Szepieniec and B. Preneel,?"Block-anti-circulant unbalanced Oil?and Vinegar", Proc. of Selected Areas?in Cryptography, LNCS 11959, pp.?574-588, 2020.
Y. Hashimoto, "On the security of?Circulant UOV/Rainbow", IACR ePrint?2018-947, Oct. 2018.
J. Ding, J. Deaton, Vishakha and?Bo-Yin Yang, "The nested subset?differential attack: a practical direct?attack against LUOV which forges a?signature within 210 minutes". IACR?ePrint 2020-967, Aug. 2020.
H. Furue, K. Kinjo, Y. Ikematsu, Y.?Wang, and T. Takagi, "A structural?attack on block-anti-circulant UOV at?SAC 2019", Proc. of the International?Conference on Post-Quantum?Cryptography, LNCS 12100, pp.?323-339, 2020.
K-A. Shim, S. Lee, N. Koo, "Efficientimplementations of Rainbow and UOV using AVX2", IACR Trans. Cryptogr.Hardw. Embed. Syst. vol. 2022, no. 1,pp. 245-269, 2022.
K. Sakumoto, T. Shirai, H. Hiwatari:"On provable security of UOV and HFE signature schemes against chosen-message attack", Proc. of the International Conference on Post-Quantum Cryptography, LNCS7071, pp 68-82. 2011.
L. Bettale, J.-C. Faugere andL.Perret, "Hybrid approach for solving multivariate systems over finitefields", Journal of Mathematical?Cryptology, vol. 3, pp. 177-197, 2009.
C. Wolf and B. Preneel, "Large superfluous keys in multivariate quadratic asymmetric systems", Proc. of the International Conference on Practice and Theory of Public-Key Cryptography, LNCS 3386, pp.275-287, 2005.
E. Thomae, "About the security of?multivariate quadratic public keyschemes", Dissertation Thesis, RUB,June 2013.
NIST Computer Security Resource Center, "Post-quantum cryptography, round 3 submissions", https://csrc.nist.gov/Projects/Post-QuantumCryptography/Round-3-Submissions, Feb. 3, 2023.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.