2006
DOI: 10.1007/11734666_7
|View full text |Cite
|
Sign up to set email alerts
|

Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(20 citation statements)
references
References 28 publications
0
20
0
Order By: Relevance
“…The works in [5,6,[26][27][28][29] are believed to be the latest RSA, ECC, and multivariate public key cryptographic systems on hardware, respectively. We compare our design with these systems, which is depicted in Table 4.…”
Section: Comparisons With Other Implementationsmentioning
confidence: 99%
See 1 more Smart Citation
“…The works in [5,6,[26][27][28][29] are believed to be the latest RSA, ECC, and multivariate public key cryptographic systems on hardware, respectively. We compare our design with these systems, which is depicted in Table 4.…”
Section: Comparisons With Other Implementationsmentioning
confidence: 99%
“…During the past thirty years, various multivariate cryptographic schemes have been proposed, like Unbalanced Oil-Vinegar Signature (UOV) [18], Rainbow [19,20], Tame Transformation Signature (TTS) [21,22], and others [23][24][25]. Their implementations have been one of the subjects of a lot of researches and continue to be a topic of interest in many areas, for example, efficient multivariate systems on Field Programmable Gate Arrays (FPGAs) [26], small multivariate processors on FPGAs [27], high speed Rainbow on FPGAs [28], and minimized multivariate PKC on Application Specific Integrated Circuits (ASICs) [29].…”
Section: Introductionmentioning
confidence: 99%
“…Multivariate signatures are claimed to be one of the fastest signatures, in particular, Rainbow [4] and TTS [5]. Multiple methodologies for accelerating the implementation of multivariate cryptography have been proposed due to its applicability in the area of engineering [6][7][8][9][10][11][12][13][14]. Among these methodologies, optimization of finite field multiplication is playing a crucial role since it is the most fundamental arithmetic in multivariate cryptography.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, experience indicates that this problem is hard even in the average case; thus multivariate cryptosystems at least have a chance of being difficult to break. Secondly, multivariate cryptosystems are often very efficient, see [2][3][4]. Finally, such cryptosystems can be very amenable to the user demands, with multiple parameters hidden within the system which can be altered by the user to achieve different performance goals.…”
Section: Introductionmentioning
confidence: 99%