Citation: | HUANG Huawei, DENG Lunzhi, LI Chunhua, et al., “Cryptanalysis of an Encryption Scheme Using Matrices over Finite Fields,” Chinese Journal of Electronics, vol. 27, no. 2, pp. 292-296, 2018, doi: 10.1049/cje.2017.07.007 |
M.J. Shi, "Optimal p-ary codes from one-weight linear codes over Zpm", Chinese Journal of Electronics, Vol.22, No.4, pp.799-802, 2013.
|
M.J. Shi, P. Solé and B. Wu., "Cyclic codes and the weight enumerators over F2+ vF2+ v2F2", Applied and Computational Mathematics, Vol.12, No.2, pp.247-255, 2013.
|
M.J. Shi, S.X. Zhu and S.L. Yang, "A class of optimal p-ary codes from one-weight codes over Fp[u]/m>", Journal of the Franklin Institute, Vol.350, No.5, pp.729-737, 2013.
|
M.K. Singh, "Public key cryptography with matrices", Pro. of the IEEE Workshop on Information Assurance, United States Military Academy, pp.146-152, 2004.
|
E. Stickel, "A new method for exchanging secret keys", Proc. of the Third International Conference on Information Technology and Applications (ICITA05), Vol.2, pp.426-430, 2005.
|
V. Shpilrain, "Cryptanalysis of Stickel's key exchange scheme", Third International Computer Science Symposium in Russia, Csr, Moscow, Russia, LNCS 5010, pp.283-288, 2008.
|
R. Alvarez, F.M. Martinez, J. Vicent, et al., "A matricial public key cryptosystem with digital signature", WSEAS Transactions on Mathematics, Vol.7, No.4, pp.195-204, 2008.
|
R. Alvarez, L. Tortosa, J. Vicent, et al., "Analysis and design of a secure key exchange scheme", Information Sciences, Vol.179, No.12, pp.2014-2021, 2009.
|
A.A. Kamal and A.M. Youssef, "Cryptanalysis of Alvarez et al. key exchange scheme", Information Sciences, Vol.223, No.20, pp.317-321, 2013.
|
Y. Zhao, L. Wang and L.W. Zhang, "Information-exchange using the ergodic matrices in GF(2)", Proc. ACNS 2004, Icisa Press, pp.388-397, 2004.
|
S. Pei, Y. Zhao and H. Zhao, "Construct public key encryption scheme using ergodic matrices over GF(2)", Theory and Applications of Models of Computation (TAMC 2007). LNCS 4484. Springer, Berlin, Heidelberg, pp.181-188, 2007.
|
Y. Zhao, B. Zhao and S. Pei, "On the properties of the ergodic matrix over finite field", ACTA Mathematica Sinica, Vol.55, No.3, pp.457-468, 2012. (in Chinese)
|
S. Pei, Y. Zhao and H. Zhao, "Public key encryption scheme based on the ergodic matrices", Acta Electronica Sinica, Vol.38, No.8, pp.1908-1913, 2010. (in Chinese)
|
M. Rasslan and A. Youssef, "Cryptanalysis of a public key encryption scheme using ergodic matrices", IEICE Trans. Fundamentals, Vol.E94-A, No.2, pp.853-854, 2011.
|
C.S. Gu, Z. Jing, Z.M. Yu, et al., "Security on public key encryption scheme based on ergodic matrices", Acta Electronica Sinica. Vol.42, No.10, pp.2081-2085, 2014. (in Chinese)
|