![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessRemarkably enhanced piezo-photocatalytic performance in BaTiO3/CuO heterostructures for organic pollutant degradation
Introducing polarization field of piezoelectric materials is an effective strategy to improve photocatalytic performance. In this study, a new type of BaTiO3/CuO heterostructure catalyst was designed and synthesi...
-
Chapter and Conference Paper
Efficient Key Recovery for All HFE Signature Variants
The HFE cryptosystem is one of the most popular multi- variate schemes. Especially in the area of digital signatures, the HFEv- variant offers short signatures and high performance. Recently, an instance of th...
-
Article
Open AccessCryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction
Researching post-quantum cryptography is now an important task in cryptography. Although various candidates of post-quantum cryptosystems (PQC) have been constructed, sizes of their public keys are large. Okum...
-
Chapter and Conference Paper
Cryptanalysis of a Public Key Cryptosystem Based on Diophantine Equations via Weighted LLL Reduction (Short Paper)
Okumura proposed a candidate of post-quantum cryptosystem based on Diophantine equations of degree increasing type (DEC). Sizes of public keys in DEC are small, e.g., 1,200 bits for 128 bit security, and it is...
-
Chapter and Conference Paper
Design Principles for HFEv- Based Multivariate Signature Schemes
The Hidden Field Equations (HFE) Cryptosystem as proposed by Patarin is one of the best known and most studied multivariate schemes. While the security of the basic scheme appeared to be very weak, the HFEv- v...
-
Chapter and Conference Paper
Simple Matrix Scheme for Encryption
There are several attempts to build asymmetric pubic key encryption schemes based on multivariate polynomials of degree two over a finite field. However, most of them are insecure. The common defect in many of...
-
Chapter and Conference Paper
Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations
Let X = (x 1,..,x n ) and Y = (y 1,...,y m ) be a pair of corresponding plaintext and cipherte...