Cryptology ePrint Archive: Report 2004/263
Available versions in chronological order
20041014:104108 (posted 14-Oct-2004 10:41:08 UTC)
Applications of $\mathcal{M}$ultivariate $\mathcal{Q}$uadratic Public Key Systems
Christopher Wolf and Bart Preneel
20041023:175431 (posted 23-Oct-2004 17:54:31 UTC)
Applications of $\mathcal{M}$ultivariate $\mathcal{Q}$uadratic Public Key Systems
Christopher Wolf and Bart Preneel
20041106:120101 (posted 06-Nov-2004 12:01:01 UTC)
Applications of $\mathcal{M}$ultivariate $\mathcal{Q}$uadratic Public Key Systems
Christopher Wolf and Bart Preneel
20050806:160442 (posted 06-Aug-2005 16:04:42 UTC)
Applications of $\mathcal{M}$ultivariate $\mathcal{Q}$uadratic Public Key Systems
Christopher Wolf and Bart Preneel
Publication Info: This is the extended version of the article published in Sicherheit 2005: Sicherheit --- Schutz und Zuverl{\"a}ssigkeit, Beitr{\"a}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"u}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg, volume 62 of Lecture Notes in Informatics, pages 413--424. ISBN 3-88579-391-1.
[
Cryptology ePrint archive
]