´ Etude des systèmes algébriques surdéterminés. Applications aux codes correcteurs etàetà la cryptographie, 2004. ,
Complexity study of Gröbner basis computation, INRIA, 2002. ,
On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations, Proc. International Conference on Polynomial System Solving (ICPSS), pp.71-75, 2004. ,
Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems, Proc. of MEGA 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry, 2005. ,
Osnovi teorii kvazigrup i lup, 1967. ,
Hybrid approach for solving multivariate systems over finite fields, Journal of Mathematical Cryptology, vol.3, issue.3, pp.177-197, 2009. ,
DOI : 10.1515/JMC.2009.009
URL : https://hal.archives-ouvertes.fr/hal-01148127
Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants, PKC 2011, pp.441-458, 2011. ,
DOI : 10.1007/978-3-642-19379-8_27
URL : https://hal.archives-ouvertes.fr/hal-01287981
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem, PKC 2011, pp.473-493, 2011. ,
DOI : 10.1007/978-3-642-19379-8_29
URL : https://hal.archives-ouvertes.fr/inria-00556671
Multivariate quadratic quasigroups (MQQs): Construction, bounds and complexity, Inscrypt, 6th International Conference on Information Security and Cryptology, 2010. ,
Latin squares and their applications, 1974. ,
Invertible Cycles for Ultivariate Uadratic (q) Public Key Cryptography, PKC 2007, pp.266-281, 2007. ,
New Differential-Algebraic Attacks and Reparametrization of Rainbow, ACNS 2008, pp.242-257, 2008. ,
DOI : 10.1007/978-3-540-68914-0_15
Efficient Computation of Zero-dimensional Gr??bner Bases by Change of Ordering, Journal of Symbolic Computation, vol.16, issue.4, pp.329-344, 1993. ,
DOI : 10.1006/jsco.1993.1051
A new efficient algorithm for computing Gröbner basis, p.4, 2000. ,
Analysis of the MQQ Public Key Cryptosystem, CANS 2010, pp.169-183, 2010. ,
DOI : 10.1007/978-3-642-17619-7_13
Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects, EUROCRYPT 2006, pp.30-47, 2006. ,
DOI : 10.1007/11761679_3
Differential Cryptanalysis for Multivariate Schemes, EUROCRYPT 2005, pp.341-353, 2005. ,
DOI : 10.1007/11426639_20
URL : https://hal.archives-ouvertes.fr/inria-00563961
Computers and Intractability. A guide to the theory of NP-Completeness, 1979. ,
Public key block cipher based on multivariate quadratic quasigroups, Cryptology ePrint Archive Report, p.320, 2008. ,
Multivariate quadratic trapdoor functions based on multivariate quadratic quasigroups, MATH 2008: Proceedings of the American Conference on Applied Mathematics, pp.44-49, 2008. ,
Cryptanalysis of the TTM Cryptosystem, ASIACRYPT 2000, pp.44-57, 2000. ,
DOI : 10.1007/3-540-44448-3_4
Cryptanalysis of the TTM Cryptosystem, ASIACRYPT 2000, pp.44-57, 2000. ,
DOI : 10.1007/3-540-44448-3_4
Algebraic methods for constructing asymmetric cryptosystems, AAECC-3, pp.108-119, 1986. ,
DOI : 10.1007/3-540-16776-5_713
A construction of public key cryptosystem for realizing ciphertext of size 100 bit and digital signature scheme, IEICE Transactions, vol.871, pp.102-109, 2004. ,
Digital Signatures, 2010. ,
DOI : 10.1007/978-0-387-27712-7
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization, CRYPTO 1999, pp.19-30, 1999. ,
DOI : 10.1007/3-540-48405-1_2
Elliptic curve cryptosystems, Mathematics of Computation, vol.48, issue.177, pp.203-209, 1987. ,
DOI : 10.1090/S0025-5718-1987-0866109-5
Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption, CRYPT 1988, pp.419-453, 1988. ,
DOI : 10.1007/3-540-45961-8_39
Use of Elliptic Curves in Cryptography, CRYPTO 1985, pp.417-426, 1986. ,
DOI : 10.1007/3-540-39799-X_31
A public key system with signature and master key functions, Communications in Algebra, vol.168, issue.4, 1999. ,
DOI : 10.1145/359340.359342
A public key system with signature and master key functions, Communications in Algebra, vol.168, issue.4, 1999. ,
DOI : 10.1145/359340.359342
Algebraic Attack on the MQQ Public Key Cryptosystem, CANS 2009, pp.392-401, 2009. ,
DOI : 10.1007/978-3-642-10433-6_26
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms, ROCRYPT 1996, pp.33-48, 1996. ,
DOI : 10.1007/3-540-68339-9_4
Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt 98, Designs, Codes and Cryptography, vol.20, issue.2, pp.175-209, 2000. ,
DOI : 10.1023/A:1008341625464
A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem, EUROCRYPT 2005, pp.354-370, 2005. ,
DOI : 10.1007/11426639_21
Personal e-mail communication with Danilo Gligoroski, 2008. ,
Cyclicrainbow -a multivariate signature scheme with a partially cyclic public key based on rainbow, Cryptology ePrint Archive Report, vol.424, 2010. ,
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
Multivariate quasigroups defined by t-functions, Proceedings of SCC 2010 -The 2nd International Conference on Symbolic Computation and Cryptography, 2010. ,
Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields, 2011 7th International Conference on Information Assurance and Security (IAS), 2011. ,
DOI : 10.1109/ISIAS.2011.6122839
Efficient Signature Schemes Based on Birational Permutations, CRYPTO 1993, pp.1-12, 1994. ,
DOI : 10.1007/3-540-48329-2_1
Efficient Signature Schemes Based on Birational Permutations, CRYPTO 1993, pp.1-12, 1994. ,
DOI : 10.1007/3-540-48329-2_1
Public key cryptography using permutation ppolynomials over finite fields, Cryptology ePrint Archive Report, vol.208, 2009. ,
An introduction to quasigroups and their representations, CRC, vol.48, 2007. ,
DOI : 10.1201/9781420010633
On the security of stepwise triangular systems, Designs, Codes and Cryptography, vol.27, issue.5, pp.285-302, 2006. ,
DOI : 10.1007/s10623-006-0015-5
Taxonomy of public key schemes based on the problem of multivariate quadratic equations, Cryptology ePrint Archive Report, p.77, 2005. ,
Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS, ACISP 2005, pp.518-531, 2005. ,
DOI : 10.1007/11506157_43
Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems, SPC 2006, pp.73-88, 2006. ,
DOI : 10.1007/11734666_7