Cryptographic Migration & Agility
  • About Cryptographic Migration & Agility
  • Category Overview
  • Projects and Initiatives
  • Libraries and Interfaces
  • Home
  • English
    Chinese
English
Chinese
  • Cryptographic Migration & Agility
    • About Cryptographic Migration & Agility
    • Category Overview
    • PQC Migration Overview
    • Related Work
    • Scheme Development
      • NIST PQC Algorithms
        • BIKE
        • CRYSTALS-Dilithium
        • Falcon
        • FrodoKEM
        • GeMSS
        • HQC
        • CRYSTALS-Kyber
        • Classic McEliece
        • NTRU
        • Picnic
        • NTRU-Prime
        • Rainbow
        • SABER
        • SIKE
        • SPHINCS+
      • Code-Based Schemes
      • Hash-Based Schemes
      • Lattice-Based Schemes
      • Multivariate-Based Schemes
      • Isogeny-Based Schemes
      • Other Development Efforts
    • Security Analysis
      • Cryptanalysis
      • Side-Channel Attacks
    • Evaluations & Integrations
      • Hardware Evaluations
        • General
        • FPGA Evaluations
        • Embedded Evaluations
        • IoT Evaluations
        • Automotive Evaluations
        • Micro-Controller Evaluations
      • Security Protocols & Applications
        • MACsec
        • CHAP/PAP
        • IPsec/IKEv2
        • TLS/SSL
        • DTLS
        • SRTP/ZRTP
        • Signal Protocol
        • SSH
        • Virtual Private Network (VPN)
        • DNSSEC
        • S/MIME
        • PGP/GPG
        • Kerberos
        • Single Sign-On
        • SFTP
        • Public Key Infrastructure (PKI) & Certificate
        • Distributed Ledger (Blockchain)
        • Wireless Networks
        • Onion Routing & Tor Network
        • eIDs
        • Others
    • Migration
      • Approaches & Strategies
      • Testing & Automation
      • Standards & Drafts
    • Cryptographic Agility
      • Approaches & Strategies
    • Projects and Initiatives
    • Libraries and Interfaces
    • References
    • How to Contribute
    • Contributors
  1. Cryptographic Migration & Agility
  2. Scheme Development
  3. Multivariate-Based Schemes

Multivariate-Based Schemes

  • A key exchange protocol relying on polynomial maps: [ANI19]
  • An Improvement of a Key Exchange Protocol Relying on Polynomial Maps: [SN21]
  • Current State of Multivariate Cryptography: [DP17]
  • Efficient key generation for Rainbow: [P20]
  • Multivariate Encryption Schemes Based on Polynomial Equations over Real Numbers: [YWT20]
  • New Practical Multivariate Signatures from a Nonlinear Modifier: [S21]
  • On Desynchronised Multivariate El Gamal Algorithm: [U17]
  • Rainbow, a New Multivariable Polynomial Signature Scheme: [DS05]
Last modified February 12, 2022

© 2022 Darmstadt University of Applied Sciences
Impress