Login / Signup
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems.
Jean-Charles Faugère
Danilo Gligoroski
Ludovic Perret
Simona Samardjiska
Enrico Thomae
Published in:
IACR Cryptol. ePrint Arch. (2014)
Keyphrases
</>
secret key
special case
worst case
block cipher
smart card
approximation algorithms
countermeasures
elliptic curve
image recovery
data sets
fault tolerant