The security of the birational permutation signature schemes
- 1 June 1997
- journal article
- research article
- Published by Springer Science and Business Media LLC in Journal of Cryptology
- Vol. 10 (3), 207-221
- https://doi.org/10.1007/s001459900028
Abstract
No abstract availableKeywords
This publication has 6 references indexed in Scilit:
- Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt’88Lecture Notes in Computer Science, 1995
- How to Break Shamir’s Asymmetric BasisLecture Notes in Computer Science, 1995
- Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-EncryptionLecture Notes in Computer Science, 1988
- An efficient solution of the congruencex^2 + ky^2 = mpmod{n}IEEE Transactions on Information Theory, 1987
- An efficient signature scheme based on quadratic equationsPublished by Association for Computing Machinery (ACM) ,1984
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978