%PDF-1.4 % 5 0 obj << /S /GoTo /D (section.1) >> endobj 8 0 obj (Introduction) endobj 9 0 obj << /S /GoTo /D (section.2) >> endobj 12 0 obj (Preliminaries) endobj 13 0 obj << /S /GoTo /D (section.3) >> endobj 16 0 obj (Some Permutation Polynomials) endobj 17 0 obj << /S /GoTo /D (section.4) >> endobj 20 0 obj (The Cryptosystem Poly Dragon) endobj 21 0 obj << /S /GoTo /D (subsection.4.1) >> endobj 24 0 obj (Public key generation.) endobj 25 0 obj << /S /GoTo /D (subsection.4.2) >> endobj 28 0 obj (Secret Key) endobj 29 0 obj << /S /GoTo /D (subsection.4.3) >> endobj 32 0 obj (Encryption) endobj 33 0 obj << /S /GoTo /D (subsection.4.4) >> endobj 36 0 obj (Decryption) endobj 37 0 obj << /S /GoTo /D (section.5) >> endobj 40 0 obj (The Security of the proposed Cryptosystem) endobj 41 0 obj << /S /GoTo /D (subsection.5.1) >> endobj 44 0 obj (Linearization Equation Attacks) endobj 45 0 obj << /S /GoTo /D (subsection.5.2) >> endobj 48 0 obj (Attacks with Differential Cryptanalysis) endobj 49 0 obj << /S /GoTo /D (subsection.5.3) >> endobj 52 0 obj (Grobner Basis Attacks) endobj 53 0 obj << /S /GoTo /D (subsection.5.4) >> endobj 56 0 obj (Relinearization, XL and FXL Algorithms.) endobj 57 0 obj << /S /GoTo /D (section.6) >> endobj 60 0 obj (Efficiency of the proposed cryptosystem) endobj 61 0 obj << /S /GoTo /D (subsection.6.1) >> endobj 64 0 obj (Encryption) endobj 65 0 obj << /S /GoTo /D (section.7) >> endobj 68 0 obj (Conclusion) endobj 69 0 obj << /S /GoTo /D [70 0 R /FitH ] >> endobj 83 0 obj << /Length 2269 /Filter /FlateDecode >> stream xڕXM{8W(?O!9mNݙt:=6kq"K.%O}P^l^R6P+WwW?y(Y} 4*,(tiUwsqa˸Wo2tx t#Qhh^dqX;[F֮e2_~0ݿ`UhUYU:eDZT/Ye_nۈ8 *UQ *\Rz̳$nk{od.?} nwIn^Di~$w8G2֑*ra}cwt!]*1z«yT$xmlɆ0@WH-84kt}oBw TGiLBEUR]O7 .