• No results found

[PDF] Top 20 New candidates for multivariate trapdoor functions

Has 10000 "New candidates for multivariate trapdoor functions" found on our website. Below are the top 20 most common "New candidates for multivariate trapdoor functions".

New  candidates  for  multivariate  trapdoor  functions

New candidates for multivariate trapdoor functions

... a new method for building pairs of HFE polynomials of high degree, such that the map constructed with such a pair is easy to ...build new candidates for multivariate trapdoor ... See full document

18

SBIM(Q) -   a  Multivariate  Polynomial  Trapdoor  Function  over  the  Field  of  Rational  Numbers

SBIM(Q) - a Multivariate Polynomial Trapdoor Function over the Field of Rational Numbers

... 6. Patarin, J.: Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of asymmetric algorithms. In: Maurer, U.M. (Ed.) Advances in Cryptology - EUROCRYPT 1996. LNCS, vol. 1070, pp. ... See full document

11

Wave:  A  New  Family  of  Trapdoor  One-Way  Preimage  Sampleable  Functions  Based  on  Codes

Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on Codes

... the trapdoor used in our scheme, the other one is a multiple targets version of the decoding problem (3), the so called “Decoding One Out of Many” problem (DOOM in short) ...sampleable functions is given ... See full document

63

TOT,  a  Fast  Multivariate  Public  Key  Cryptosystem  with  Basic  Secure  Trapdoor

TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor

... one-way trapdoor function, and then propose a new multivariate public key cryptosystem called TOT, which can be used for encryption, signature and ... See full document

17

Trapdoor  Functions  from  the  Computational  Diffie-Hellman  Assumption

Trapdoor Functions from the Computational Diffie-Hellman Assumption

... Trapdoor functions (TDFs) are a fundamental primitive in cryptography. Yet, the current set of assumptions known to imply TDFs is surprisingly limited, when compared to public-key encryption. We present a ... See full document

30

Online-Offline  Homomorphic  Signatures  for  Polynomial  Functions

Online-Offline Homomorphic Signatures for Polynomial Functions

... a new line of research that envisages designing multilinear maps from iO ...iO candidates themselves rely on leveled multilinear maps, which raises the legitimate question of how much trust can be placed in ... See full document

36

Trapdoor  Computational  Fuzzy  Extractors   and  Stateless  Cryptographically-Secure  Physical  Unclonable  Functions

Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions

... are new, it should be noted that the concepts of unclonability and uniqueness have been used extensively in the past for other applications ...One-Way Functions and popularized in 2001 ... See full document

17

Algebraic (Trapdoor)  One  Way  Functions   and  their  Applications

Algebraic (Trapdoor) One Way Functions and their Applications

... Our new solution removes these two problems. As discussed above, we can instantiate our proto- cols over RSA moduli, and prove their security under the DDH/RSA/Factoring Assumptions over such groups, therefore ... See full document

39

Injective  Trapdoor  Functions  via  Derandomization:  How  Strong  is  Rudichs  Black-Box  Barrier?

Injective Trapdoor Functions via Derandomization: How Strong is Rudichs Black-Box Barrier?

... hash functions from any one-way function; circumventing the black-box separation results of Impagliazzo and Rudich [IR89] and of Simon [Sim98], respectively? Conversely, can one enhance the aforementioned ... See full document

32

EFLASH:  A  New  Multivariate  Encryption  Scheme

EFLASH: A New Multivariate Encryption Scheme

... seen new candidates and strategies emerge for multivariate ...Previously, multivariate schemes centered around bijective functions that map from vector spaces of size n back into a ... See full document

17

On new multivariate cryptosystems with nonlinearity gap

On new multivariate cryptosystems with nonlinearity gap

... secure multivariate public key were unsuccessful, but the research of the development of new candidates for secure multivariate public keys is going on (see for instance [3] and further ... See full document

18

New  Techniques  for  Efficient  Trapdoor  Functions   and  Applications

New Techniques for Efficient Trapdoor Functions and Applications

... On the other hand, building TDFs turns out to be much more difficult than building PKE, mostly due to the requirement of recovering the entire input, which in turn is the reason behind the lack of black-box ... See full document

34

Extension  Field  Cancellation:  a  New  Central  Trapdoor  for  Multivariate  Quadratic  Systems

Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems

... Porras et al. proposed a new central trapdoor which they call ZHFE [24]. Up until this point, the extension field polynomial in HFE-based cryptosystem required the number of nonzero coefficients to be small ... See full document

14

Hierarchical  Identity-Based (Lossy)  Trapdoor  Functions

Hierarchical Identity-Based (Lossy) Trapdoor Functions

... our new definition of partial lossiness under mild hardness assumptions in groups of prime ...our new version of partial lossiness) against adaptive adversaries for hierarchies of constant ...of ... See full document

39

Enhancements  Are  Blackbox  Non-Trivial:  Impossibility  of  Enhanced  Trapdoor  Permutations  from  Standard  Trapdoor  Permutations

Enhancements Are Blackbox Non-Trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations

... Trapdoor permutations (TDPs) [RSA78, Rab79] are a family of permutations, where each permu- tation in the family is easy to compute given the underlying index key, and also easy to invert given a corresponding ... See full document

32

COVARIANCE MATRIX OF MULTIVARIATE REWARD PROCESSES WITH NONLINEAR REWARD FUNCTIONS

COVARIANCE MATRIX OF MULTIVARIATE REWARD PROCESSES WITH NONLINEAR REWARD FUNCTIONS

... reward functions of constant rates, defined on a semi-Markov process, first were studied by Masuda and Sumita, ...reward functions were introduced in Soltani, ...a multivariate process Z ( t ) = ( Z ... See full document

11

Representation of Multivariate Functions via the Potential Theory and Applications to Inequalities

Representation of Multivariate Functions via the Potential Theory and Applications to Inequalities

... This paper is organized as follows. In Section 2, we include some known results that are necessary later in the paper. Section 3 is dedicated to the proof of Theorem 1.3. Based on it, we prove Theorem 1.1 in Section 4. ... See full document

15

Deniable  Functional  Encryption

Deniable Functional Encryption

... the trapdoor mechanism is to replace the original circuit C with a trapdoor circuit Trap[C] that the receiver faking algorithm can then use to program the output in some ... See full document

31

A New Multivariate Weibull Distribution

A New Multivariate Weibull Distribution

... In this section we have given simulation study and real data application of the proposed multivariate Weibull distribution. The simulation study has been conducted to see the performance of maximum likelihood ... See full document

14

Finding you on the Internet: Entity resolution on Twitter accounts and real world people

Finding you on the Internet: Entity resolution on Twitter accounts and real world people

... More research is needed to establish a better matching function. The results of Experiment 1 show that, although inclusion is very high, it is still impossible to identify matching Twitter accounts due to a lack of ... See full document

102

Show all 10000 documents...