Contents
Academic literature on the topic 'Multivariate cryptosystem'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Multivariate cryptosystem.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Multivariate cryptosystem"
Singh, Rajesh P., Bhaba K. Sarma, and Anupam Saikia. "A Public Key Cryptosystem Using a Group of Permutation Polynomials." Tatra Mountains Mathematical Publications 77, no. 1 (2020): 139–62. http://dx.doi.org/10.2478/tmmp-2020-0013.
Full textLi, Weijian, Xian Huang, Huimin Zhao, Guoliang Xie, and Fuxiang Lu. "Fuzzy Matching Template Attacks on Multivariate Cryptography: A Case Study." Discrete Dynamics in Nature and Society 2020 (June 20, 2020): 1–11. http://dx.doi.org/10.1155/2020/9475782.
Full textNIE, Xu-Yun, Zhao-Hu XU, Yong-Jian LIAO, and Ting ZHONG. "Cryptanalysis of Extended Multivariate Public Key Cryptosystem." Chinese Journal of Computers 36, no. 6 (2014): 1177–82. http://dx.doi.org/10.3724/sp.j.1016.2013.01177.
Full textYuan, Feng, Hai Wen Ou, and Sheng Wei Xu. "A New Public Key Cryptographic Scheme." Applied Mechanics and Materials 303-306 (February 2013): 1944–47. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.1944.
Full textSelvakumar, K., and S. Naveen Kumar. "Multivariate Quadratic Quasigroup Polynomial based Cryptosystem in Vanet." International Journal of Engineering & Technology 7, no. 4.10 (2018): 832. http://dx.doi.org/10.14419/ijet.v7i4.10.26767.
Full textSmith-Tone, Daniel, and Cristina Tone. "A multivariate cryptosystem inspired by random linear codes." Finite Fields and Their Applications 69 (January 2021): 101778. http://dx.doi.org/10.1016/j.ffa.2020.101778.
Full textHuixian, Li, Gao Jin, Wang Lingyun, and Pang Liaojun2. "MPKC-based Threshold Proxy Signcryption Scheme." International Arab Journal of Information Technology 17, no. 2 (2019): 196–206. http://dx.doi.org/10.34028/iajit/17/2/7.
Full textSingh, Rajesh P., Anupam Saikia, and Sarma B. K. "Little Dragon Two: An efficient Multivariate Public Key Cryptosystem." International journal of Network Security & Its Applications 2, no. 2 (2010): 1–10. http://dx.doi.org/10.5121/ijnsa.2010.2201.
Full textSun, Xiaoyan, Maosheng Zhang, Shaowu Mao, Zhengwei Ren, and Huanguo Zhang. "Software watermarking scheme based on multivariate public key cryptosystem." Wuhan University Journal of Natural Sciences 21, no. 3 (2016): 257–61. http://dx.doi.org/10.1007/s11859-016-1168-3.
Full textSun, Yan Jun, Chang Ming Liu, Hai Yu Li, and Zhe Yuan. "One-Way Function Construction Based on the MQ Problem and Logic Function." Applied Mechanics and Materials 220-223 (November 2012): 2360–63. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2360.
Full text