[1] 王鑫, 刘景美, 王新梅. 多变量签名模型的改进[J]. 北京邮电大学学报, 2009, 32(5):124-127. Wang Xin, Liu Jingmei, Wang Xinmei. Improvement on multivariate signature scheme model[J]. Journal of Beijing University of Posts and Telecommunications, 2009, 32(5): 124-127. [2] Cai N, Chan T. Theory of secure network coding [J]. Proceedings of the IEEE, 2011, 99(3): 421-437. [3] 孔凡坤, 李钢, 傅海阳. 基于双钥体制的3G系统安全认证方案[J].重庆邮电大学学报:自然科学版, 2004, 16(6): 81-83. Kong Fankun, Li Gang, Fu Haiyang.Authentication scheme of 3G system based on double-key cryptosystem[J]. Journal of Chongqing University of Posts and Telecommunications: Natural Science Edition, 2004, 16(6): 81-83. [4] 韩春艳, 包旭雷, 王光义. 一种新的数字混沌密码序列及其性能分析[J]. 重庆邮电大学学报:自然科学版, 2010, 22(3): 334-338. Han Chunyan, Bao Xulei, Wang Guangyi.A new digital chaotic cipher sequence and its property[J]. Journal of Chongqing University of Posts and Telecommunications: Natural Science Edition, 2010, 22(3): 334-338. [5] Wang L C, Yang B Y, Hu Y H, et al. A medium-field multivariate public key encryption scheme//CT-RSA 2006. Berlin: Springer-Verlag, 2006: 132-149. [6] Ding J, Hu L, Nie X, et al. High order linearization equation (hole) attack on multivariate public key cryptosystems//PKC 2007. Berlin: Springer-Verlag, 2007: 233-248. [7] Gazzonifilho D, Baretto P. Demonstrating data possession and uncheatable data transfer. (2006). http://eprint.iacr.org/2006/150.pdf. [8] Yang B Y, Chen J M. Rank attacks and defence in tame-like multivariate PKCs//ACISP 2005. Berlin: Springer-Verlag, 2005: 518-531. [9] Billet O, Macario-Rat G. Cryptanalysis of the square cryptosystems//ASIACRYPT 2009. Berlin: Springer-Verlag, 2009: 451-468. |