[1] |
SHOR P . Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J]. SIAM Rev, 1999,41(2):303-332.
|
[2] |
付向群, 鲍皖苏, 周淳 . Shor 整数分解量子算法的加速实现[J]. 科学通报 2010,4: 322-327. FU X Q , BAO W S , ZHOU C . Speeding up implementation for Shor's factorization quantum[J]. Chinese Sci Bull, 2010,4: 322-327.
|
[3] |
MYASNIKOV A D , USHAKOV A . Quantum algorithm for the dis-crete logarithm problem for matrices over finite group rings[EB/OL]. , 2012.
|
[4] |
BERNSTEIN D J , BUCHMANN J , DAHMEN E . Post-Quantum Cryptography[M]. Berlin: Springer-Verlag, 2009.
|
[5] |
DING J T , YANG B Y . Multivariate Public Key Cryptography[M]. Berlin: Springer-Verlag, 2009.
|
[6] |
TANG S , XU L . Proxy signature scheme based on isomorphisms of polynomials[A]. NSS 2012[C]. Fujian, China, 2012. 113-125.
|
[7] |
MATSUMOTO T , IMAI H . Public quadratic polynomial-tuples for efficient signature-verification and message-encryption[A]. Advances in Cryptology—EUROCRYPT'88[C]. Switzerland, 1988. 419-453.
|
[8] |
PATARIN J . Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt'88[A]. Advances in Cryptology—CRYPT0'95[C]. Santa Barbara, California, USA, 1995. 248-261.
|
[9] |
PATARIN J , COURTOIS N , GOUBIN L . Flash, a fast multivariate signature algorithm[A]. Topics in Cryptology—CT-RSA 2001[C]. San Francisco, CA, USA 2001.298-307.
|
[10] |
DING J . A new variant of the Matsumoto-Imai cryptosystem through perturbation[A]. Public Key Cryptography–PKC 2004[C]. Singapore, 2004.305-318.
|
[11] |
DUBOIS V , FOUQUE P A , STERN J . Cryptanalysis of SFLASH with slightly modified parameters[A]. Advances in Cryptology-EUROCRYPT 2007[C]. Barcelona, Spain, 2007.264-275.
|
[12] |
DING J , GOWER J E . Inoculating multivariate schemes against dif-ferential attacks[A]. Public Key Cryptography-PKC 2006[C]. New York, USA, 2006.290-301.
|
[13] |
PETZOLDT A , BULYGIN S , BUCHMANN J . CyclicRainbow–a multi-variate signature scheme with a partially cyclic public key[A]. Progress in Cryptology-INDOCRYPT 2010[C]. Hyderabad, India, 2010.33-48.
|
[14] |
CLOUGH C L , DING J . Secure variants of the square encryption scheme[A]. Post-Quantum Cryptography[C]. Darmstadt, Germany, 2010.153-164.
|
[15] |
TSUJII S , GOTAISHI M , TADAKI K , et al. Proposal of a signature scheme based on STS trapdoor[A]. Post-quantum cryptography[C]. Darmstadt, Germany, 2010.201-217.
|
[16] |
THOMAE E , WOLF C . Roots of square: cryptanalysis of double-layer square and square+[A]. Post-Quantum Cryptography[C]. Taipei, China, 2011.83-97.
|
[17] |
THOMAE E , WOLF C . Cryptanalysis of enhanced TTS, STS and all its variants, or: why cross-terms are important[A]. Progress in Cryp-tology-AFRICACRYPT 2012[C]. Ifrance, Morocco, 2012.188-202.
|
[18] |
WANG H Z , ZHANG H G . Extended multivariate public key crypto-systems with secure encryption function[J]. Science China Information Sciences[C]. 2011,54(6):1161-1171.
|
[19] |
王后珍, 张焕国, 管海明 等. 多变量代数理论及其在密码学中的应用[J]. 北京工业大学学报, 2010,5: 627-634. WANG H Z , ZHANG H G , GUAN H M , et al. Multivariate algebra theory and its application in cryptography[J]. Journal of Beijing Uni-versity of Technology, 2010,5: 627-634.
|
[20] |
ALBRECHT M R , CID C , FAUGèRE J C , et al. On the relation be-tween the MXL family of algorithms and Gr?bner basis algorithms[J]. Journal of Symbolic Computation, 2012,47(8):926-941.
|
[21] |
THOMAE E , WOLF C . Solving underdetermined systems of multi-variate quadratic equations revisited[A]. PKC 2012[C]. Darmstadt, Germany, 2012.156-171.
|