Algebraic methods for constructing asymmetric cryptosystems, Lecture Notes in Computer Science, vol.229, pp.108-119, 1985. ,
DOI : 10.1007/3-540-16776-5_713
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms, Advances in Cryptology ? EUROCRYPT '96, pp.33-48, 1996. ,
DOI : 10.1007/3-540-68339-9_4
Sflash, a fast asymmetric signature scheme for low-cost smartcards -primitive specification and supporting documentation ,
Unbalanced Oil and Vinegar Signature Schemes, ADVANCES IN CRYPTOLOGY EUROCRYPT 1999, pp.206-222, 1999. ,
DOI : 10.1007/3-540-48910-X_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.970
A public key system with signature and master key functions, Communications in Algebra, vol.168, issue.4, pp.2207-2222, 1999. ,
DOI : 10.1145/359340.359342
TTS: High-Speed Signatures on a Low-Cost Smart Card, Lecture Notes in Computer Science, vol.3156, pp.371-385, 2004. ,
DOI : 10.1007/978-3-540-28632-5_27
Practical Cryptanalysis of SFLASH, Proceedings of the 27th annual international cryptology conference on Advances in cryptology. CRYPTO'07, pp.1-12, 2007. ,
DOI : 10.1007/978-3-540-74143-5_1
URL : https://hal.archives-ouvertes.fr/inria-00556691
A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic, Advances in Cryptology -EUROCRYPT 2014 -33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.1-16, 2014. ,
DOI : 10.1007/978-3-642-55220-5_1
URL : https://hal.archives-ouvertes.fr/hal-00835446
Cryptanalysis of the TTM cryptosystem, Advances in Cryptology ? ASIACRYPT '00, pp.44-57, 1976. ,
On the security of stepwise triangular systems, Designs, Codes and Cryptography, vol.27, issue.5, pp.285-302, 2006. ,
DOI : 10.1007/s10623-006-0015-5
Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important, Progress in Cryptology ? AFRICACRYPT 2012, pp.188-202, 2012. ,
DOI : 10.1007/978-3-642-31410-0_12
Cryptanalysis of Rainbow, In: SCN. Lecture Notes in Computer Science, vol.4116, pp.336-347, 2006. ,
DOI : 10.1007/11832072_23
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization, In: CRYPTO. Lecture Notes in Computer Science, vol.1666, pp.19-30, 1999. ,
DOI : 10.1007/3-540-48405-1_2
Kipnis-Shamir Attack on HFE Revisited, LNCS, vol.4990, pp.399-411, 2007. ,
DOI : 10.1007/978-3-540-79499-8_31
Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants, Public Key Cryptography ? PKC 2011, pp.441-458, 2011. ,
DOI : 10.1007/978-3-642-19379-8_27
URL : https://hal.archives-ouvertes.fr/hal-01287981
Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic, Designs, Codes and Cryptography, vol.4, issue.4, pp.1-52, 2013. ,
DOI : 10.1007/s10623-012-9617-2
URL : https://hal.archives-ouvertes.fr/hal-00776072
The computational complexity of some problems of linear algebra, Journal of Computer and System Sciences, 1999. ,
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank, Advances in Cryptology ? ASIACRYPT 2001, pp.402-421, 2001. ,
DOI : 10.1007/3-540-45682-1_24
Multivariate Quadratic Trapdoor Functions based on Multivariate Quadratic Quasigroups, Proceedings of the American Conference on Applied Mathematics. MATH, World Scientific and Engineering Academy and Society (WSEAS), pp.44-49, 2008. ,
Algebraic Attack on the MQQ Public Key Cryptosystem, In: CANS. Lecture Notes in Computer Science, vol.5888, pp.392-401, 2009. ,
DOI : 10.1007/978-3-642-10433-6_26
Analysis of the MQQ Public Key Cryptosystem, In: CANS. Lecture Notes in Computer Science, vol.6467, pp.169-183, 2010. ,
DOI : 10.1007/978-3-642-17619-7_13
MQQ-SIG, In: INTRUST. Lecture Notes in Computer Science, vol.7222, pp.184-203, 2011. ,
DOI : 10.1007/978-3-642-32298-3_13
URL : https://hal.archives-ouvertes.fr/hal-00778083
The Multivariate Probabilistic Encryption Scheme MQQ-ENC, In: SCC, 2012. ,
ebacs: Ecrypt benchmarking of cryptographic systems, 2014. ,
Gr??bner bases of bihomogeneous ideals generated by polynomials of bidegree <mml:math altimg="si1.gif" display="inline" overflow="scroll" xmlns:xocs="http://www.elsevier.com/xml/xocs/dtd" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.elsevier.com/xml/ja/dtd" xmlns:ja="http://www.elsevier.com/xml/ja/dtd" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:tb="http://www.elsevier.com/xml/common/table/dtd" xmlns:sb="http://www.elsevier.com/xml/common/struct-bib/dtd" xmlns:ce="http://www.elsevier.com/xml/common/dtd" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:cals="http://www.elsevier.com/xml/common/cals/dtd"><mml:mrow><mml:mo>(</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo>)</mml:mo></mml:mrow></mml:math>: Algorithms and complexity, Journal of Symbolic Computation, vol.46, issue.4, pp.406-437, 2011. ,
DOI : 10.1016/j.jsc.2010.10.014
The Magma Algebra System I: The User Language, Computational algebra and number theory, pp.235-265, 1993. ,
DOI : 10.1006/jsco.1996.0125
A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem, In: EUROCRYPT. Lecture Notes in Computer Science, vol.3494, pp.354-370, 2005. ,
DOI : 10.1007/11426639_21
Large Superfluous Keys in $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic Asymmetric Systems, Lecture Notes in Computer Science, vol.3386, pp.275-287, 2005. ,
DOI : 10.1007/978-3-540-30580-4_19
Equivalent Keys in Multivariate Quadratic Public Key Systems, Journal of Mathematical Cryptology, vol.4, pp.375-415, 2011. ,
Equivalent Keys in HFE, C*, and Variations, Progress in Cryptology ? Mycrypt 2005, pp.33-49, 2005. ,
DOI : 10.1007/11554868_4
About the Security of Multivariate Quadratic Public Key Schemes, 2013. ,
Algorithms for Construction of Multivariate Quadratic Quasigroups (MQQs) and Their Parastrophe Operations in Arbitrary Galois Fields, J. Inf. Assurance and Security, vol.7, issue.3, pp.146-172, 2012. ,
The Theory of Matrices, Chelsea, vol.1, 1959. ,
Orthogonal Matrices Over Finite Fields, The American Mathematical Monthly, vol.76, issue.2, pp.152-164, 1969. ,
DOI : 10.2307/2317262
Etudes d?hypoth'eses algorithmiques et attaques de primitives cryptographiques, 2011. ,
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization, Advances in Cryptology ? CRYPTO '99, pp.19-30, 1999. ,
DOI : 10.1007/3-540-48405-1_2
Cryptanalysis of MinRank Advances in Cryptology ? CRYPTO, LNCS, vol.5157, pp.280-296, 2008. ,
On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations, Proc. of International Conference on Polynomial System Solving (ICPSS), pp.71-75, 2004. ,
Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems, Proc. of MEGA 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry, 2005. ,