Public quadratic polynomial-tuples for efficient signatureverification and message-encryption, Advances in Cryptology ? EUROCRYPT 1988, pp.419-453, 1988. ,
The Oil and Vinegar signature scheme. presented at the Dagstuhl Workshop on Cryptography, 1997. ,
Variations around two schemes of t.matsumoto and h.imai, Advances in Cryptology -Asiacrypt'98, pp.35-49, 1998. ,
QUARTZ, 128-Bit Long Digital Signatures, CT-RSA'01, pp.282-297, 2001. ,
DOI : 10.1007/3-540-45353-9_21
Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations. Cryptology ePrint Archive, Report, vol.077, 2005. ,
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM J. Comput, vol.26, issue.5, pp.1484-1509, 1997. ,
Large superfluous keys in multivariate quadratic asymmetric systems, Public Key Cryptography, pp.275-287, 2005. ,
Cryptoanalysis of the matsumoto and imai public key scheme of eurocrypt'88, CRYPTO, pp.248-261, 1995. ,
Algebraic cryptanalysis of Hidden Field Equation (HFE) cryptosystems using Gröbner bases, Advances in Cryptology -CRYPTO 2003, pp.44-60, 2003. ,
Cryptanalysis of SFLASH with Slightly Modified??Parameters, EUROCRYPT, pp.264-275, 2007. ,
DOI : 10.1007/978-3-540-72540-4_15
URL : https://hal.archives-ouvertes.fr/inria-00556692
Practical Cryptanalysis of SFLASH, Lecture Notes in Computer Science, vol.4622, pp.1-12, 2007. ,
DOI : 10.1007/978-3-540-74143-5_1
URL : https://hal.archives-ouvertes.fr/inria-00556691
Unbalanced Oil and Vinegar Signature Schemes, EUROCRYPT, pp.206-222, 1999. ,
DOI : 10.1007/3-540-48910-X_15
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms, EUROCRYPT, pp.33-48, 1996. ,
DOI : 10.1007/3-540-68339-9_4
Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects, EUROCRYPT, pp.30-47, 2006. ,
DOI : 10.1007/11761679_3
Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems, Lecture Notes in Computer Science, vol.2904, pp.235-251, 2003. ,
DOI : 10.1007/978-3-540-24582-7_18
URL : https://hal.archives-ouvertes.fr/inria-00071464
Practical cryptanalysis of the identification scheme based on the isomorphism of polynomial with one secret problem, Public Key Cryptography, 2011. ,
Key Recovery on Hidden Monomial Multivariate Schemes, Lecture Notes in Computer Science, vol.4965, pp.19-30, 2008. ,
DOI : 10.1007/978-3-540-78967-3_2
On the symplectic invariants of a subspace of a vector space, Acta Mathematica Scientia, vol.11, pp.251-253, 1991. ,
On the orthogonal invariants of a subspace of a vector space over a finite field of odd characteristic, Linear Algebra and its Applications, vol.184, pp.123-133, 1993. ,
DOI : 10.1016/0024-3795(93)90374-W
Anzahl theorems in finite singular symplectic, unitary and orthogonal geometries, Discrete Mathematics, vol.123, issue.1-3, pp.131-150, 1993. ,
DOI : 10.1016/0012-365X(93)90013-J
Further studies of singular symplectic, unitary and orthogonal geometries over finite fields, Southeast Asian Bulletin of Mathematics, vol.17, pp.177-196, 1993. ,
Geometry of classical groups over finite fields, 1993. ,
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization, CRYPTO, pp.19-30, 1999. ,
DOI : 10.1007/3-540-48405-1_2
Advances in Information Security, 2006. ,
Finite fields, 1997. ,
DOI : 10.1017/CBO9780511525926