Proceedings of the 2013 International Conference on Advanced Computer Science and Electronics Information 2013
DOI: 10.2991/icacsei.2013.5
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of an Implementation of TTM Cryptosystems Based on Q2k -module

Abstract: -TTM cryptosystems proposed by T.Moh are very fast due to the properties of tame automorphisms and small finite fields. The success of the first implementation of this system relies on the construction of Q 8 -module. Unfortunately, Jintai Ding and Timonthy Hodges have defeated it by decomposing function Q 8 into terms S, T 1 , T 2 . Later Chunyen Chou, D. J. Guan and Jiunming Chen gave a systematic way to construct Q 2 k -module. In this paper, we describe an implementation of TTM cryptosystems based on this … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 7 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?