L. Bettale, J. Faugère, and L. Perret, Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic, Designs, Codes and Cryptography, vol.4, issue.4, pp.1-52, 2013.
DOI : 10.1515/jmc.2011.004

URL : https://hal.archives-ouvertes.fr/hal-00776072

O. Billet and J. Ding, Overview of Cryptanalysis Techniques in??Multivariate Public Key Cryptography, pp.263-283, 2009.
DOI : 10.1007/978-3-540-93806-4_15

C. Bouillaguet, P. Fouque, and G. Macario-rat, Practical Key-Recovery for All Possible Parameters of SFLASH, Advances in Cryptology -ASIACRYPT 2011 -17th International Conference on the Theory and Application of Cryptology and Information Security Proceedings, volume 7073 of Lecture Notes in Computer Science, pp.667-685, 2011.
DOI : 10.1007/978-3-642-25385-0_36

J. Ding and B. Yang, Degree of Regularity for HFEv and HFEv-, Proceedings, pp.52-66, 2013.
DOI : 10.1007/978-3-642-38616-9_4

V. Dubois, P. Fouque, A. Shamir, and J. Stern, Practical cryptanalysis of SFLASH Advances in Cryptology -CRYPTO, 27th Annual International Cryptology Conference Proceedings, pp.1-12, 2007.

J. Faugère, Algebraic cryptanalysis of HFE using Gröbner bases, 2003.

J. Faugère and A. Joux, Algebraic cryptanalysis of hidden field equation (HFE) cryptosystems using gröbner bases, Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference Proceedings, volume 2729 of Lecture Notes in Computer Science, pp.44-60, 2003.

G. Pierre-alain-fouque, L. Macario-rat, J. Perret, and . Stern, Total break of the l -ic signature scheme, Public Key Cryptography -PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography Proceedings, volume 4939 of Lecture Notes in Computer Science, pp.1-17, 2008.

L. Goubin and N. Courtois, Cryptanalysis of the TTM Cryptosystem, Advances in Cryptology -ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security Proceedings, volume 1976 of Lecture Notes in Computer Science, pp.44-57, 2000.
DOI : 10.1007/3-540-44448-3_4

L. Granboulan, A. Joux, and J. Stern, Inverting HFE Is Quasipolynomial, 26th Annual International Cryptology Conference Proceedings, pp.345-356, 2006.
DOI : 10.1007/11818175_20

A. Kipnis, J. Patarin, and L. Goubin, Unbalanced Oil and Vinegar Signature Schemes, EUROCRYPT, volume 1592 of Lecture Notes in Computer Science, pp.206-222, 1999.
DOI : 10.1007/3-540-48910-X_15

URL : http://www.smartcard.bull.com/sct/fr/fichier/eurocrypt99.ps

A. Kipnis and A. Shamir, Cryptanalysis of the HFE public key cryptosystem by relinearization Advances in Cryptology -CRYPTO '99, 19th Annual International Cryptology Conference Proceedings, volume 1666 of Lecture Notes in Computer Science, pp.19-30, 1999.

T. Matsumoto and H. Imai, Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption, EUROCRYPT, pp.419-453, 1988.
DOI : 10.1007/3-540-45961-8_39

URL : http://dsns.csie.nctu.edu.tw/research/crypto/HTML/PDF/E88/419.PDF

J. Patarin, Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt???88, 15th Annual International Cryptology Conference Proceedings, pp.248-261, 1995.
DOI : 10.1007/3-540-44750-4_20

J. Patarin, Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms, Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, pp.33-48, 1996.
DOI : 10.1007/3-540-68339-9_4

J. Patarin, N. Courtois, and L. Goubin, Quartz, 128-bit long digital signatures Topics in Cryptology -CT-RSA 2001, The Cryptographer's Track at RSA Conference, Proceedings, volume 2020 of Lecture Notes in Computer Science, pp.282-297, 2001.

L. Perret, Bases de Gröbner en Cryptographie Post-Quantique. (Gröbner bases techniques in Quantum-Safe Cryptography), 2016.

I. Etsi and . Qsc, Quantum-safe cryptography (QSC); quantum-safe algorithmic framework

J. Vates and D. Smith-tone, Key Recovery Attack for All Parameters of HFE-, Proceedings, volume 10346 of Lecture Notes in Computer Science, pp.272-288, 2017.
DOI : 10.1007/978-3-319-29360-8

C. Wolf, Multivariate quadratic polynomials in public key cryptography, 2005.