New identified strategies to forge multivariate signature schemes
A rogue certificate authority (RCA) is a dishonest entity that has the trust of web browsers and users to produce valid key pairs which are vulnerable. This work analyses two acknowledged post-quantum secure Multivariate Quadratic Problem (MQP) based signature schemes, namely the UOV and Rainbow sig...
| Main Authors: | Abdul Jamal, Nurul Amiera Sakinah, Kamel Ariffin, Muhammad Rezal, Sapar, Siti Hasana, Abdullah, Kamilah |
|---|---|
| Format: | Article |
| Published: |
MDPI AG
2022
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/102304/ |
Similar Items
New directions in forging multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
Novel forgery mechanisms in multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah, et al.
Published: (2023)
by: Abdul Jamal, Nurul Amiera Sakinah, et al.
Published: (2023)
Novel weakness multivariate quadratic structures detected within Macaulay Matrix
by: Abdullah, Kamilah, et al.
Published: (2025)
by: Abdullah, Kamilah, et al.
Published: (2025)
A new efficient Rabin-like signature scheme
by: Mahad, Zahari, et al.
Published: (2016)
by: Mahad, Zahari, et al.
Published: (2016)
Cryptanalysis of the SHMW signature scheme
by: Lau, Terry Shue Chien, et al.
Published: (2024)
by: Lau, Terry Shue Chien, et al.
Published: (2024)
Rank AGS identification scheme and signature scheme
by: Nagaraja, Vaishnavi, et al.
Published: (2023)
by: Nagaraja, Vaishnavi, et al.
Published: (2023)
Wavelet analysis of resultant velocity belonging to genuine and forged signatures
by: Ahmad, Sharifah Mumtazah Syed, et al.
Published: (2016)
by: Ahmad, Sharifah Mumtazah Syed, et al.
Published: (2016)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A New Proxy Signature Scheme As Secure As ElGamal Signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A new arbitrated signing scheme based on BFHP
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2015)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2015)
A new arbitrated signing scheme based on BFHP
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
A new version of ElGamal signature scheme
by: Eddie Shahril Ismail,, et al.
Published: (2006)
by: Eddie Shahril Ismail,, et al.
Published: (2006)
A digital signature system.
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2010)
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2010)
An efficient identification scheme based on Bivariate function hard problem
by: Boon, Chian Tea, et al.
Published: (2022)
by: Boon, Chian Tea, et al.
Published: (2022)
A new approach of direct recycling of aluminium alloy chips (AA6061) in hot press forging process
by: Yusuf, Nur Kamilah
Published: (2013)
by: Yusuf, Nur Kamilah
Published: (2013)
An efficient certificateless signature scheme
by: Yap, Wun She, et al.
Published: (2006)
by: Yap, Wun She, et al.
Published: (2006)
Analytical cryptanalysis upon N = p2q utilizing Jochemsz-May strategy
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
Comparison of signatures
on paper and graphic pad using
multivariate analysis
by: Alagan, Vinothiniy
Published: (2022)
by: Alagan, Vinothiniy
Published: (2022)
Comparison of signature on paper and
apple® ipad using multivariate
analysis
by: Xian, Lim Sue
Published: (2022)
by: Xian, Lim Sue
Published: (2022)
3-Move undeniable signature scheme
by: Kurosawa, Kaoru, et al.
Published: (2005)
by: Kurosawa, Kaoru, et al.
Published: (2005)
Linkability of some blind signature schemes
by: Heng, Swee-Huay, et al.
Published: (2007)
by: Heng, Swee-Huay, et al.
Published: (2007)
Resilience Planning: Forging a New Planning Paradigm
by: Newman, Peter, et al.
Published: (2011)
by: Newman, Peter, et al.
Published: (2011)
A New Digital Signature Scheme Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Analysis of the effects and relationship of perceived handwritten signature's size, graphical complexity, and legibility with dynamic parameters for forged and genuine samples
by: Syed Ahmad Abdul Rahman, Sharifah Mumtazah, et al.
Published: (2013)
by: Syed Ahmad Abdul Rahman, Sharifah Mumtazah, et al.
Published: (2013)
Carving, Forging, Stealing
by: Robertson, Rachel
Published: (2010)
by: Robertson, Rachel
Published: (2010)
UMP forging ahead
by: T.N., Alagesh
Published: (2017)
by: T.N., Alagesh
Published: (2017)
Forging pacts for services
by: The Star,
Published: (2012)
by: The Star,
Published: (2012)
New Jochemsz–May Cryptanalytic bound for RSA system utilizing common Modulus N = p2q
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
by: Adenan, Nurul Nur Hanisah, et al.
Published: (2021)
A method of estimating the p-adic sizes of common zeros of partial derivative polynomials associated with a quintic form
by: Sapar, Siti Hasana, et al.
Published: (2009)
by: Sapar, Siti Hasana, et al.
Published: (2009)
A method of estimating the p-adic sizes of common zeros of partial derivative polynomials associated with an nth degree form
by: Sapar, Siti Hasana, et al.
Published: (2007)
by: Sapar, Siti Hasana, et al.
Published: (2007)
On the estimation of cardinality of common solutions to congruence equation
by: Mohd Atan, Kamel Ariffin, et al.
Published: (2010)
by: Mohd Atan, Kamel Ariffin, et al.
Published: (2010)
An Estimation of p-adic Sizes of Common Zeros of Partial Derivative Polynomials
Associated with a Seventh Degree Form with Complete Dominant Terms
by: Sapar, Siti Hasana, et al.
Published: (2008)
by: Sapar, Siti Hasana, et al.
Published: (2008)
Penganggaran saiz p-adic pensifar sepunya terbitan separa polinomial berdarjah enam
by: Sapar, Siti Hasana, et al.
Published: (2007)
by: Sapar, Siti Hasana, et al.
Published: (2007)
An estimation of exponential sums associated with sextic polynomial
by: Sapar, Siti Hasana, et al.
Published: (2009)
by: Sapar, Siti Hasana, et al.
Published: (2009)
An identification scheme based on bivariate function hard problem
by: Tea, Boon Chian, et al.
Published: (2014)
by: Tea, Boon Chian, et al.
Published: (2014)
Effects of hot press forging parameter and life cycle assessment in direct recycling of AA6061 aluminium
by: Yusuf, Nur Kamilah
Published: (2017)
by: Yusuf, Nur Kamilah
Published: (2017)
UPM forges internationalisation efforts for quality education
by: Suhaidi, Nurul
Published: (2021)
by: Suhaidi, Nurul
Published: (2021)
Cryptanalysis of some proxy signature schemes without certificates
by: Yap, Wun-She, et al.
Published: (2007)
by: Yap, Wun-She, et al.
Published: (2007)
Design And Cryptanalysis Of Encryption And Signature Schemes Without Certificates
by: Yap, Wun She
Published: (2007)
by: Yap, Wun She
Published: (2007)
Relations among security notions for undeniable signature schemes
by: Kurosawa, Kaoru, et al.
Published: (2006)
by: Kurosawa, Kaoru, et al.
Published: (2006)
Similar Items
-
New directions in forging multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023) -
Novel forgery mechanisms in multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah, et al.
Published: (2023) -
Novel weakness multivariate quadratic structures detected within Macaulay Matrix
by: Abdullah, Kamilah, et al.
Published: (2025) -
A new efficient Rabin-like signature scheme
by: Mahad, Zahari, et al.
Published: (2016) -
Cryptanalysis of the SHMW signature scheme
by: Lau, Terry Shue Chien, et al.
Published: (2024)