[1] MATSUMOTO T,IMAI H. Public quadratic polynomial-tuples for efficient signature-verification and message-encryption[C]//Proceedings of the 1988 Workshop on the Theory and Application of Cryptographic Techniques,LNCS 330. Berlin:Springer,1988:419-453. [2] 胡磊, 聂旭云. 多变量公钥密码发展研究报告(2010-2014)[J]. 中国密码学会通讯,2016(2):15-22. (HU L,NIE X Y. Research report on the development of multivariable public key cryptography(2010-2014)[J]. Communication of Chinese Association for Cryptologic Research,2016(2):15-22.) [3] KIPNIS A,SHAMIR A. Cryptanalysis of the HFE public key cryptosystem by relinearization[C]//Proceedings of the 19th Annual International Cryptology Conference,LNCS 1666. Berlin:Springer, 1999:19-30. [4] BETTALE L,FAUGÈRE J C,PERRET L. Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic[J]. Designs,Codes and Cryptography,2013,69(1):1-52. [5] ZHANG W,TAN C H. Algebraic cryptanalysis of Yasuda,Takagi and Sakurai's signature scheme[C]//Proceedings of the 2014 International Conference on Information Security and Cryptology. Cham:Springer,2014:53-66. [6] ZHANG W,TAN C H. A secure variant of Yasuda,Takagi and Sakurai's signature scheme[C]//Proceedings of the 17th International Conference on Information Security and Cryptology,LNCS 8949. Cham:Springer,2014:53-66. [7] KIPNIS A,PATARIN J,GOUBIN L. Unbalanced oil and vinegar signature schemes[C]//Proceedings of the 1999 International Conference on the Theory and Applications of Cryptographic Techniques,LNCS 1592. Berlin:Springer,1999:206-222. [8] YASUDA T,SAKURAI K. A multivariate encryption scheme with rainbow[C]//Proceedings of the 17th International Conference on Information and Communications Security,LNCS 9543. Cham:Springer,2015:236-251. [9] PERLNER R,PETZOLDT A,SMITH-TONE D. Total break of the SRP encryption scheme[C]//Proceedings of the 24th International Conference on Selected Areas in Cryptography, LNCS 10719. Cham:Springer,2017:355-373. [10] IKEMATSU Y, PERLNER R, SMITH-TONE D, et al. HFERP-a new multivariate encryption scheme[C]//Proceedings of the 9th International Conference on Information and Communications Security, LNCS 10786. Cham:Springer, 2018:396-416. [11] FAUGÈRE J C,EL DIN M S,SPAENLEHAUER P J. Computing loci of rank defects of linear matrices using Gröbner bases and applications to cryptology[C]//Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation. New York:ACM,2010:257-264. [12] CLOUGH C,BAENA J,DING J,et al. Square,a new multivariate encryption scheme[C]//Proceedings of the 2009 Cryptographers'Track at the RSA Conference,LNCS 5473. Berlin:Springer,2009:252-264. [13] 鲁刚, 聂旭云, 秦志光, 等. 一种多变量公钥密码体制的安全性分析[J]. 电子科技大学学报,2018,47(2):242-246.(LU G, NIE X Y,QIN Z G,et al. Cryptanalysis of a multivariate public key cryptosystem[J]. Journal of University of Electronic Science and Technology of China,2018,47(2):242-246.) [14] 鲁刚. 多变量公钥密码体制的设计与安全性分析研究[D]. 成都:电子科技大学,2017:107. (LU G. Research on design and cryptanalysis of multivariate public key cryptosystem[D]. Chengdu:University of Electronic Science and Technology of China,2017:107.) [15] HILLAR C J,LIM L H. Most tensor problems are NP-hard[J]. Journal of the ACM,2013,60(6):No. 45. [16] PETZOLDT A,CHEN M S,DING J,et al. HMFEv-an efficient multivariate signature scheme[C]//Proceedings of the 8th International Workshop on Post-Quantum Cryptography,LNCS 10346. Cham:Springer,2017:205-223. |