2008
DOI: 10.1007/978-3-540-88403-3_7
|View full text |Cite
|
Sign up to set email alerts
|

Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ℓIC-Derivatives

Abstract: Abstract. We present instances of MPKCs (multivariate public key cryptosystems) with design, given the best attacks we know, and implement them on commodity PC hardware. We also show that they can hold their own compared to traditional alternatives. In fact, they can be up to an order of magnitude faster.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
11
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 28 publications
1
11
0
Order By: Relevance
“…In 2004, traditional signature schemes using RSA or ECC are much slower than TTS/4 and SFLASH [1,10,37], but the latter have both been broken [17,18]. Although TTS/7 and 3IC-p seem ok today [8], the impending doom of SHA-1 [33] will force longer message digests and thus slower MPKCs while leaving RSA untouched. …”
Section: History and Questionsmentioning
confidence: 99%
See 3 more Smart Citations
“…In 2004, traditional signature schemes using RSA or ECC are much slower than TTS/4 and SFLASH [1,10,37], but the latter have both been broken [17,18]. Although TTS/7 and 3IC-p seem ok today [8], the impending doom of SHA-1 [33] will force longer message digests and thus slower MPKCs while leaving RSA untouched. …”
Section: History and Questionsmentioning
confidence: 99%
“…-The segment structure is given by a sequence 0 < v 1 [8,17]. According to their criteria, the former instance should not be more secure than Rainbow/TTS at (F 31 , 24, 20, 20) and roughly the same as (F 31 , 16,16,8,16).…”
Section: Rainbow and Tts Families Of Digital Signaturesmentioning
confidence: 99%
See 2 more Smart Citations
“…Special attacks on Rainbow-like schemes were proposed by Ding and Yang in [DY08]. There have also been some attempts to derive appropriate parameters from the complexities of these attacks [CC08]. However, it is still an open problem how we have to adapt the parameters of multivariate schemes to future developments in cryptanalysis and computing power.…”
Section: Introductionmentioning
confidence: 99%