Sciweavers

ICCSA
2005
Springer

Perturbed Hidden Matrix Cryptosystems

14 years 6 months ago
Perturbed Hidden Matrix Cryptosystems
Abstract. We apply internal perturbation [3] to the matrix-type cryptosystems [Cn] and HM constructed in [9]. Using small instances of these variants, we investigate the existence of linearization equations and degree 2 equations that could be used in a XL attack. Our results indicate that these new variants may be suitable for use in practical implementations. We propose a specific instance for practical implementation, and estimate its performance and security.
Zhiping Wu, Jintai Ding, Jason E. Gower, Dingfeng
Added 27 Jun 2010
Updated 27 Jun 2010
Type Conference
Year 2005
Where ICCSA
Authors Zhiping Wu, Jintai Ding, Jason E. Gower, Dingfeng Ye
Comments (0)