6CHEN A I T, CHEN C H O, CHEN M S, et al. Practical-sized instances of multivariate PKCs: Rainbow and LIC-dedvatives[A]. Proceedings of the 2nd International Workshop on Post-Quantum Cryptography[C]. Cincinnati, OH, USA,2008.95-108.
7IMAI H, MATSUMOTO T. Algebraic methods for constructing asymmetric cryptosystems[A]. Proceedings of the 3rd International Conference on Algebraic Algorithms and Error-Correcting Codes[C]. Grenoble, France, 1985. 108-119.
8MATSUMOTO T, IMAI H. Public quadratic polynomial-tuples for efficient signature-verification and message -encryption[A]. Proceedings of the Workshop on the Theory and Application of Cryptographic T~clmiques[C]. Davos, 1988.419-453.
9DING J. A new variant of the matsumoto-imai cryptosystem through perturbation[A]. Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography[C]. Singapore, 2004. 305-318.
10PATARIN J. Hidden fields equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms[A]. Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques[C]. Saragossa, Spain, 1996. 33-48.