T. Matsumoto and H. Imai, Public quadratic polynomial-tuples for efficient signatureverification and message-encryption, Advances in Cryptology ? EUROCRYPT 1988, pp.419-453, 1988.

J. Patarin, The Oil and Vinegar signature scheme. presented at the Dagstuhl Workshop on Cryptography, 1997.

J. Patarin, L. Goubin, N. C. Courtois, and . Hm, Variations around two schemes of t.matsumoto and h.imai, Advances in Cryptology -Asiacrypt'98, pp.35-49, 1998.

J. Patarin, N. Courtois, and L. Goubin, QUARTZ, 128-Bit Long Digital Signatures, CT-RSA'01, pp.282-297, 2001.
DOI : 10.1007/3-540-45353-9_21

C. Wolf and B. Preneel, Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations. Cryptology ePrint Archive, Report, vol.077, 2005.

W. Peter and . Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM J. Comput, vol.26, issue.5, pp.1484-1509, 1997.

C. Wolf and B. Preneel, Large superfluous keys in multivariate quadratic asymmetric systems, Public Key Cryptography, pp.275-287, 2005.

J. Patarin, Cryptoanalysis of the matsumoto and imai public key scheme of eurocrypt'88, CRYPTO, pp.248-261, 1995.

J. Faugère and A. Joux, Algebraic cryptanalysis of Hidden Field Equation (HFE) cryptosystems using Gröbner bases, Advances in Cryptology -CRYPTO 2003, pp.44-60, 2003.

V. Dubois, P. Fouque, and J. Stern, Cryptanalysis of SFLASH with Slightly Modified??Parameters, EUROCRYPT, pp.264-275, 2007.
DOI : 10.1007/978-3-540-72540-4_15

URL : https://hal.archives-ouvertes.fr/inria-00556692

V. Dubois, P. Fouque, A. Shamir, and J. Stern, Practical Cryptanalysis of SFLASH, Lecture Notes in Computer Science, vol.4622, pp.1-12, 2007.
DOI : 10.1007/978-3-540-74143-5_1

URL : https://hal.archives-ouvertes.fr/inria-00556691

A. Kipnis, J. Patarin, and L. Goubin, Unbalanced Oil and Vinegar Signature Schemes, EUROCRYPT, pp.206-222, 1999.
DOI : 10.1007/3-540-48910-X_15

J. Patarin, Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms, EUROCRYPT, pp.33-48, 1996.
DOI : 10.1007/3-540-68339-9_4

J. Faugère and L. Perret, Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects, EUROCRYPT, pp.30-47, 2006.
DOI : 10.1007/11761679_3

F. Levy, D. Vehel, and L. Perret, Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems, Lecture Notes in Computer Science, vol.2904, pp.235-251, 2003.
DOI : 10.1007/978-3-540-24582-7_18

URL : https://hal.archives-ouvertes.fr/inria-00071464

J. Pierre-alain-fouque, C. Bouillaguet, and L. Perret, Practical cryptanalysis of the identification scheme based on the isomorphism of polynomial with one secret problem, Public Key Cryptography, 2011.

G. Pierre-alain-fouque, J. Macario-rat, and . Stern, Key Recovery on Hidden Monomial Multivariate Schemes, Lecture Notes in Computer Science, vol.4965, pp.19-30, 2008.
DOI : 10.1007/978-3-540-78967-3_2

Z. Wan, On the symplectic invariants of a subspace of a vector space, Acta Mathematica Scientia, vol.11, pp.251-253, 1991.

Z. Wan, On the orthogonal invariants of a subspace of a vector space over a finite field of odd characteristic, Linear Algebra and its Applications, vol.184, pp.123-133, 1993.
DOI : 10.1016/0024-3795(93)90374-W

Z. Wan, Anzahl theorems in finite singular symplectic, unitary and orthogonal geometries, Discrete Mathematics, vol.123, issue.1-3, pp.131-150, 1993.
DOI : 10.1016/0012-365X(93)90013-J

Z. Wan, Further studies of singular symplectic, unitary and orthogonal geometries over finite fields, Southeast Asian Bulletin of Mathematics, vol.17, pp.177-196, 1993.

Z. Wan, Geometry of classical groups over finite fields, 1993.

A. Kipnis and A. Shamir, Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization, CRYPTO, pp.19-30, 1999.
DOI : 10.1007/3-540-48405-1_2

J. Ding, J. E. Gower, and D. Schmidt, Advances in Information Security, 2006.

R. Lidl and H. Niederreiter, Finite fields, 1997.
DOI : 10.1017/CBO9780511525926