Sign in

A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems.

Jean-Charles FaugèreDanilo GligoroskiLudovic PerretSimona SamardjiskaEnrico Thomae
Published in: Public Key Cryptography (2015)
Keyphrases
  • secret key
  • private key
  • special case
  • countermeasures
  • secure communication
  • database
  • computational complexity
  • elliptic curve
  • neural network
  • smart card
  • signature scheme
  • ddos attacks
  • key distribution
  • block cipher