Key-recovery attacks on \(\mathsf{ASASA}\) (Q2413617): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract) / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Influence of the Algebraic Degree of $F^{-1}$ on the Algebraic Degree of $G \circ F$ / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434867 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants / rank
 
Normal rank
Property / cites work
 
Property / cites work: Polynomial Decompositions in Polynomial Time / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4276318 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algorithmic regularity for polynomials and applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374925 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Noise-tolerant learning, the parity problem, and the statistical query model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778859 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On solving LPN using BKW and variants, Implementation and analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941862 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Cryptanalysis of SFLASH / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of HFE with Internal Perturbation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Cryptography – PKC 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cube Attacks on Tweakable Black Box Polynomials / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3365303 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of 2R− Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: An efficient algorithm for decomposing multivariate polynomials and its applications to cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: High order derivatives and decomposition of multivariate polynomials / rank
 
Normal rank
Property / cites work
 
Property / cites work: Decomposition of generic multivariate polynomials / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptography from New Multivariate Quadratic Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Improved LPN Algorithm / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4934705 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3803032 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4343439 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4373649 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2724447 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: A family of trapdoor ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249261 / rank
 
Normal rank

Latest revision as of 15:23, 16 July 2024

scientific article
Language Label Description Also known as
English
Key-recovery attacks on \(\mathsf{ASASA}\)
scientific article

    Statements

    Key-recovery attacks on \(\mathsf{ASASA}\) (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    14 September 2018
    0 references
    0 references
    ASASA
    0 references
    algebraic cryptanalysis
    0 references
    multivariate cryptography
    0 references
    LPN
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references