Login / Signup
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems.
Jean-Charles Faugère
Danilo Gligoroski
Ludovic Perret
Simona Samardjiska
Enrico Thomae
Published in:
Public Key Cryptography (2015)
Keyphrases
</>
secret key
private key
special case
countermeasures
secure communication
database
computational complexity
elliptic curve
neural network
smart card
signature scheme
ddos attacks
key distribution
block cipher