Cryptanalysis of two sparse polynomial based public key cryptosystems
The application of sparse polynomials in cryptography has been studied recently. A public key encryption scheme EnRoot [4] and an identification scheme SPIFI [1] based on sparse polynomials were proposed. In this paper, we show that both of them are insecure. The designers of SPIFI proposed the modi...
Saved in:
Main Authors: | BAO, Feng, DENG, Robert H., Geiselmann, Willi, Schnorr, Claus, Steinwandt, Rainer, WU, Hongjun |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2001
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1108 https://ink.library.smu.edu.sg/context/sis_research/article/2107/viewcontent/Bao2001_CryptanalysisOfTwoSparsePolynomial_pv.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Cryptanalysis of Polynomial Authentication and Signature Scheme
by: WU, Hongjun, et al.
Published: (2000) -
On the equivalence of McEliece's and Niederreiter's public-key cryptosystems
by: LI, Y. X., et al.
Published: (1994) -
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults
by: BAO, Feng, et al.
Published: (2005) -
Cryptanalysis of some Hash Functions based on Block Ciphers and Codes
by: WU, Hongjun, et al.
Published: (2002) -
Cryptanalysis of the m-permutation protection schemes
by: WU, Hongjun, et al.
Published: (2000)