Security Enhancement of Various MPKCs by 2-Layer Nonlinear Piece in Hand Method
スポンサーリンク
概要
- 論文の詳細を見る
Following the last proposal of the nonlinear Piece in Hand method, which has 3-layer structure, 2-layer nonlinear Piece in Hand method is proposed. Both of them aim at enhancing the security of existing and future multivariate public key cryptosystems. The new nonlinear Piece in Hand is compared with the 3-layer method and PMI+, which was proposed by Ding, et al.
- (社)電子情報通信学会の論文
- 2009-10-01
著者
-
TADAKI Kohtaro
Research and Development Initiative, Chuo University
-
TSUJII Shigeo
Research and Development Initiative, Chuo University
-
Tsujii S
Institute Of Information Security
-
Tsujii Shigeo
Institute Of Information Security
-
Fujita Ryou
Research And Development Initiative Chuo University
-
GOTAISHI Masahito
Research and Development Initiative, Chuo University
-
FUJITA Ryou
Institute of Information Security
-
KANEKO Toshinobu
Department of Electrical Engineering, Faculty of Science and Technology
-
Tadaki Kohtaro
Research And Development Initiative Chuo University
-
Tsujii S
Graduate School Of Information Security Institute Of Information Security:research And Development I
-
Kaneko Toshinobu
Department Of Electrical Engineering Faculty Of Science And Technology
-
Gotaishi Masahito
Research And Development Initiative Chuo University
-
Kaneko Toshinobu
Department Of Electric Engineering Science University Of Tokyo
関連論文
- Key-Generation Algorithms for Linear Piece In Hand Matrix Method
- Anonymous Query Language Retrieval (ライフインテリジェンスとオフィス情報システム)
- Anonymous Query Language Retrieval (情報セキュリティ)
- Lowering the Error Floors of Irregular LDPC Code on Fast Fading Environment with Perfect and Imperfect CSIs(Wireless Communication Technologies)
- A Study on Higher Order Differential Attack of KASUMI(Symmetric Cryptography,Cryptography and Information Security)
- Key-Generation Algorithms for Linear Piece In Hand Matrix Method
- Dually-Perturbed Matsumoto-Imai Signature (DPMS) Scheme
- Security Enhancement of Various MPKCs by 2-Layer Nonlinear Piece in Hand Method
- Proposal for Piece in Hand Matrix : General Concept for Enhancing Security of Multivariate Public Key Cryptosystems(Discrete Mathematics and Its Applications)
- Mapping for Iterative MMSE-SIC with Belief Propagation
- A Subspace Blind Identification Algorithm with Reduced Computational Complexity : Colored Noise Case(Digital Signal Processing)
- A Practical Subspace Blind Identification Algorithm with Reduced Computational Complexity : Colored Noise Case
- A Practical Subspace Blind Identification Algorithm with Reduced Computational Complexity(Digital Signal Processing)
- A Strength Evaluation of a Pseudorandom Number Generator MUGI against Linear Cryptanalysis(Symmetric Key Cryptography)(Cryptography and Information Security)
- Optimization for the Algebraic Method and Its Application to an Attack of MISTY1 (Symmetric Cipher) (Cryptography and Information Security)
- Scheduling Algorithm with Power Allocation for Random Unitary Beamforming
- MIMO Systems in the Presence of Feedback Delay
- Improvements of Addition Algorithm on Genus 3 Hyperellipic Curves and Their Implementation(Public Key Cryptography)(Cryptography and Information Security)
- Baby Step Giant Step Algorithms in Point Counting of Hyperelliptic Curves
- Robust noise suppression algorithm using the only Kalman filter theory for white and colored noises (Speech) -- (国際ワークショップ"Asian workshop on speech science and technology")
- Robust Noise Suppression Algorithm with the Kalman Filter Theory for White and Colored Disturbance
- Robust noise suppression algorithm using the only Kalman filter theory for white and colored noises
- A CGM APPROACH TO SUBSPACE BASED BLIND CHANNEL IDENTIFICATION
- Strength of Round function in RC6 Block Cipher against Higher Order Differential Attack
- The Algeblaic Degree and Security of Generalized PURE Ciphers
- Correction of Overlapping Template Matching Test Included in NIST Randomness Test Suite(Information Theory and Its Applications)
- A Study on Higher Order Differential Attack of Camellia(Special Section on Cryptography and Information Security)
- Special Section on Cryptography and Information Security
- A New Higher Order Differential of CLEFIA