References
2025
- Hiroki Furue, Yasuhiko Ikematsu, Fumitaka Hoshino, Tsuyoshi Takagi, Haruhisa Kosuge,
Kimihiro Yamakoshi, Rika Akiyama, Satoshi Nakamura, Shingo Orihara, and Koha Kinjo.
NIST PQC Additional Signatures Second Round Candidate: QR-UOV.
In Symposium on Cryptography and Information Security (SCIS), 3A2-2, 2025.
Availlable at http://crypto.mist.i.u-tokyo.ac.jp/publications/SCIS2025-3A2-2.pdf
- Fumitaka Hoshino, Hiroki Furue, Yasuhiko Ikematsu, Tsuyoshi Takagi, Haruhisa Kosuge,
Kimihiro Yamakoshi, Rika Akiyama, Satoshi Nakamura, Shingo Orihara, and Koha Kinjo.
On the Reference Implementation of QR-UOV and its Revised Version.
In Symposium on Cryptography and Information Security (SCIS), 3A2-3, 2025.
Available at http://crypto.mist.i.u-tokyo.ac.jp/publications/SCIS2025-3A2-3.pdf
2024
- Hiroki Furue and Momonari Kudo.
Polynomial XL: A variant of the XL algorithm using Macaulay matrices over polynomial rings.
In Markku-Juhani Saarinen and Daniel Smith-Tone, editors, Post-Quantum Cryptography, pages 109-143, Cham, 2024. Springer Nature Switzerland.
- Haruhisa Kosuge and Keita Xagawa.
Probabilistic hash-and-sign with retry in the quantum random oracle model.
In IACR InternationalConference on Public-Key Cryptography, pages 259-288. Springer, 2024.
- Hiroki Furue, Yasuhiko Ikematsu, Fumitaka Hoshino, Tsuyoshi Takagi,
Kan Yasuda, Toshiyuki Miyazawa, Akira Nagai, Rika Akiyama, and Koha Kinjo.
Further Security Analysis for Multivariate Polynomial Signature Scheme QR-UOV.
In Symposium on Cryptography and Information Security (SCIS), 1A2-4, 2024.
Available at http://crypto.mist.i.u-tokyo.ac.jp/publications/SCIS2024-1A2-4.pdf
- Fumitaka Hoshino, Hiroki Furue, Yasuhiko Ikematsu, Tsuyoshi Takagi,
Kan Yasuda, Toshiyuki Miyazawa, Akira Nagai, Rika Akiyama, and Koha Kinjo.
More Efficient Software Implementation of QR-UOV.
In Symposium on Cryptography and Information Security (SCIS), 1A2-5, 2024.
Available at http://crypto.mist.i.u-tokyo.ac.jp/publications/SCIS2024-1A2-5.pdf
2023
- Hiroki Furue and Yasuhiko Ikematsu.
A new security analysis against MAYO and QR-UOV using rectangular MinRank attack.
In Junji Shikata and Hiroki Kuzuno, editors, Advances in Information and Computer Security, pages 101-116, Cham, 2023. Springer Nature Switzerland.
- Hiroki Furue, Yasuhiko Ikematsu, Fumitaka Hoshino, Yutaro Kiyomura, Tsunekazu Saito, and Tsuyoshi Takagi.
Secure parameters for multivariate polynomial signature scheme QR-UOV.
In Symposium on Cryptography and Information Security (SCIS), 1A1- 4, 2023.
Available at http://crypto.mist.i.u-tokyo.ac.jp/publications/SCIS2023-1A1-4.pdf
- Fumitaka Hoshino, Hiroki Furue, Yasuhiko Ikematsu, Tsunekazu Saito, Yutaro Kiyomura, and Tsuyoshi Takagi.
Efficient software implementation of signature scheme QR-UOV.
In Symposium on Cryptography and Information Security (SCIS), 1A1- 5, 2023.
Available at http://crypto.mist.i.u-tokyo.ac.jp/publications/SCIS2023-1A1-5.pdf
2021
- Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, and Tsuyoshi Takagi.
A new variant of unbalanced oil and vinegar using quotient ring: QR-UOV.
In Mehdi Tibouchi and Huaxiong Wang, editors, Advances in Cryptology - ASIACRYPT 2021, pages 187-217, Cham, 2021. Springer International Publishing.