Novel forgery mechanisms in multivariate signature schemes
Multivariate cryptography is listed among the promising candidates for post-quantum cryptography primitives. Its hard problem depends on the difficulty of solving m multivariate quadratic equations in n variables over a finite field, hence the name Multivariate Quadratic Problem (MQP). In this paper...
| Main Authors: | Abdul Jamal, Nurul Amiera Sakinah, Kamel Ariffin, Muhammad Rezal, Abdullah, Kamilah |
|---|---|
| Format: | Article |
| Published: |
Badih/Ghusayni
2023
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/109137/ |
Similar Items
New identified strategies to forge multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah, et al.
Published: (2022)
by: Abdul Jamal, Nurul Amiera Sakinah, et al.
Published: (2022)
New directions in forging multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
Novel weakness multivariate quadratic structures detected within Macaulay Matrix
by: Abdullah, Kamilah, et al.
Published: (2025)
by: Abdullah, Kamilah, et al.
Published: (2025)
A new efficient Rabin-like signature scheme
by: Mahad, Zahari, et al.
Published: (2016)
by: Mahad, Zahari, et al.
Published: (2016)
Cryptanalysis of the SHMW signature scheme
by: Lau, Terry Shue Chien, et al.
Published: (2024)
by: Lau, Terry Shue Chien, et al.
Published: (2024)
Rank AGS identification scheme and signature scheme
by: Nagaraja, Vaishnavi, et al.
Published: (2023)
by: Nagaraja, Vaishnavi, et al.
Published: (2023)
Signature Verification And Forgery Detection Including Recognition Of Courtesy Amount In Cheques
by: Mohd Yusof, Mohd Hafizuddin
Published: (2005)
by: Mohd Yusof, Mohd Hafizuddin
Published: (2005)
Off-line signature verification and forgery detection using fuzzy modeling
by: Hanmandlu, , M, et al.
Published: (2005)
by: Hanmandlu, , M, et al.
Published: (2005)
Forgery Detection in Dynamic Signature Verification by Entailing Principal Component Analysis
by: Sayeed, Shohel, et al.
Published: (2007)
by: Sayeed, Shohel, et al.
Published: (2007)
Passive video forgery detection techniques: a survey
by: Abdul Wahab, Ainuddin Wahid, et al.
Published: (2014)
by: Abdul Wahab, Ainuddin Wahid, et al.
Published: (2014)
Off-line signature verification and forgery detection system based on fuzzy modeling
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
A digital signature system.
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2010)
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2010)
An efficient certificateless signature scheme
by: Yap, Wun She, et al.
Published: (2006)
by: Yap, Wun She, et al.
Published: (2006)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Forgery detection using Krawtchouk moments
by: Alenezi, Ahmad M., et al.
Published: (2019)
by: Alenezi, Ahmad M., et al.
Published: (2019)
Comparison of signatures
on paper and graphic pad using
multivariate analysis
by: Alagan, Vinothiniy
Published: (2022)
by: Alagan, Vinothiniy
Published: (2022)
Comparison of signature on paper and
apple® ipad using multivariate
analysis
by: Xian, Lim Sue
Published: (2022)
by: Xian, Lim Sue
Published: (2022)
A New Proxy Signature Scheme As Secure As ElGamal Signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
3-Move undeniable signature scheme
by: Kurosawa, Kaoru, et al.
Published: (2005)
by: Kurosawa, Kaoru, et al.
Published: (2005)
Linkability of some blind signature schemes
by: Heng, Swee-Huay, et al.
Published: (2007)
by: Heng, Swee-Huay, et al.
Published: (2007)
An identification scheme based on bivariate function hard problem
by: Tea, Boon Chian, et al.
Published: (2014)
by: Tea, Boon Chian, et al.
Published: (2014)
Anti-Forgery Document Detection System (FDDS)
by: Rassem, Taha H., et al.
Published: (2018)
by: Rassem, Taha H., et al.
Published: (2018)
Overview of cross site request forgery and client-side protection
by: Yaakob, Razali, et al.
Published: (2013)
by: Yaakob, Razali, et al.
Published: (2013)
A new arbitrated signing scheme based on BFHP
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2015)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2015)
A new arbitrated signing scheme based on BFHP
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
Identity-based encryption schemes - a review
by: Tea, Boon Chian, et al.
Published: (2019)
by: Tea, Boon Chian, et al.
Published: (2019)
A novel approach to dynamic signature verification using sensor-based data glove
by: N.S., Kamel, et al.
Published: (2009)
by: N.S., Kamel, et al.
Published: (2009)
Comparative analysis of three asymmetric encryption schemes based upon the intractability of square roots modulo N = p²q
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
Cryptanalysis of some proxy signature schemes without certificates
by: Yap, Wun-She, et al.
Published: (2007)
by: Yap, Wun-She, et al.
Published: (2007)
Design And Cryptanalysis Of Encryption And Signature Schemes Without Certificates
by: Yap, Wun She
Published: (2007)
by: Yap, Wun She
Published: (2007)
Relations among security notions for undeniable signature schemes
by: Kurosawa, Kaoru, et al.
Published: (2006)
by: Kurosawa, Kaoru, et al.
Published: (2006)
The security of the FDH variant of Chaum's undeniable signature scheme
by: Ogata, Wakaha, et al.
Published: (2006)
by: Ogata, Wakaha, et al.
Published: (2006)
A new version of ElGamal signature scheme
by: Eddie Shahril Ismail,, et al.
Published: (2006)
by: Eddie Shahril Ismail,, et al.
Published: (2006)
Generalized Scheme For Fractal Based Digital Signature (GFDS).
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Post quantum signature schemes for the block chain technology
by: Wu, Zi Feng
Published: (2019)
by: Wu, Zi Feng
Published: (2019)
Synchronization and a secure communication scheme using optical star network
by: Theesar, S. Jeeva Sathya, et al.
Published: (2013)
by: Theesar, S. Jeeva Sathya, et al.
Published: (2013)
The effects of fraud/forgery on a letter of
credit: an international perspective
by: Roslinda Mohamed Fadzil,
Published: (2000)
by: Roslinda Mohamed Fadzil,
Published: (2000)
Image splicing forgery approachs: A review and future direction
by: Ernawati, Muji, et al.
Published: (2022)
by: Ernawati, Muji, et al.
Published: (2022)
An investigation of the merkle signature scheme (MSS) for cryptographically generated address (CGA) signatures in mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
Comparison of edge detection algorithms for texture analysis on copy-move forgery detection images
by: Idris, Bashir, et al.
Published: (2022)
by: Idris, Bashir, et al.
Published: (2022)
Similar Items
-
New identified strategies to forge multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah, et al.
Published: (2022) -
New directions in forging multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023) -
Novel weakness multivariate quadratic structures detected within Macaulay Matrix
by: Abdullah, Kamilah, et al.
Published: (2025) -
A new efficient Rabin-like signature scheme
by: Mahad, Zahari, et al.
Published: (2016) -
Cryptanalysis of the SHMW signature scheme
by: Lau, Terry Shue Chien, et al.
Published: (2024)