Advances in Cryptology - CRYPTO 2003

From MaRDI portal
Revision as of 02:46, 9 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5428110

DOI10.1007/b11817zbMath1122.94371OpenAlexW2480001466WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428110

Antoine Joux, Jean-Charles Faugère

Publication date: 28 November 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b11817




Related Items (76)

An improvement for GVWStronger bounds on the cost of computing Gröbner bases for HFE systemsCombinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption SchemeGeneralization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key EncryptionPractical Cryptanalysis of k-ary $$C^*$$A Rank Attack Against Extension Field CancellationPolly cracker, revisitedPublic key cryptography based on ergodic matrices over finite fieldBoolean ring cryptographic equation solvingA new framework for computing Gröbner basesCompact representation of polynomials for algorithms for computing Gröbner and involutive basesInvolutive method for computing Gröbner bases over \(\mathbb F_2\)Role of involutive criteria in computing Boolean Gröbner basesOn the security of biquadratic \(C^\ast\) public-key cryptosystems and its generalizationsInverting square systems algebraically is exponentialMI-T-HFE, A New Multivariate Signature SchemeOn implementing the symbolic preprocessing function over Boolean polynomial rings in Gröbner basis algorithms using linear algebraThe Hunt for Weighing Matrices of Small OrdersCryptanalysis of HFE, multi-HFE and variants for odd and even characteristicKey-recovery attacks on \(\mathsf{ASASA}\)Enhanced matrix power function for cryptographic primitive constructionEfficient public-key operation in multivariate schemesAn algorithm for solving over-determined multivariate quadratic systems over finite fieldsFirst fall degree and Weil descentQuasi-subfield polynomials and the elliptic curve discrete logarithm problemOn the last fall degree of zero-dimensional Weil descent systemsCryptanalysis of the TRMS Signature Scheme of PKC’05Characteristic set algorithms for equation solving in finite fieldsOn the relation between the MXL family of algorithms and Gröbner basis algorithmsObtaining and solving systems of equations in key variables only for the small variants of AESAxioms for a theory of signature basesDecomposing polynomial sets into simple sets over finite fields: the zero-dimensional caseChordal graphs in triangular decomposition in top-down styleThe degree of regularity of a quadratic polynomialLattice polly cracker cryptosystemsBoolean Gröbner basesProbabilistic analysis on Macaulay matrices over finite fields and complexity of constructing Gröbner basesOn the efficiency of solving Boolean polynomial systems with the characteristic set methodA survey on signature-based algorithms for computing Gröbner basesGeneralization of the F5 algorithm for calculating Gröbner bases for polynomial idealsOn computation of Boolean involutive basesOn extended algebraic immunityComputation of involutive and Gröbner bases using the tableau representation of polynomialsSquare-Vinegar Signature SchemeNonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key CryptosystemsAnalysis of Multivariate Hash FunctionsEspresso: a stream cipher for 5G wireless communication systemsTotal break of the SRP encryption schemeAn improvement over the GVW algorithm for inhomogeneous polynomial systemsComplexity of Gröbner basis detection and border basis detectionBIBasis, a package for REDUCE and Macaulay2 computer algebra systems to compute Boolean involutive and Gröbner basesOn the first fall degree of summation polynomialsPolynomial Equivalence Problems: Algorithmic and Theoretical AspectsKipnis-Shamir Attack on HFE RevisitedA comparison of unrestricted dynamic Gröbner basis algorithmsA dynamic F4 algorithm to compute Gröbner basesAlgebraic Cryptanalysis of the Data Encryption StandardOn the last fall degree of Weil descent polynomial systemsCryptanalysis of the extension field cancellation cryptosystemA Variant of the F4 AlgorithmSquare, a New Multivariate Encryption SchemeRecent Developments in Multivariate Public Key CryptosystemsCryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)A public key cryptosystem using a group of permutation polynomialsAnalysis of multivariate encryption schemes: application to DobPolybori: A framework for Gröbner-basis computations with Boolean polynomialsOn enumeration of polynomial equivalence classes and their application to MPKCGeneral Fault Attacks on Multivariate Public Key CryptosystemsOn Provable Security of UOV and HFE Signature Schemes against Chosen-Message AttackSecurity analysis via algebraic attack against ``a new encryption scheme for multivariate quadratic systemWhy you cannot even hope to use Gröbner bases in cryptography: an eternal golden braid of failuresChosen ciphertext attack on ZHFEA new signature-based algorithms for computing Gröbner basesOn the complexity of the \(F_5\) Gröbner basis algorithmA new post-quantum multivariate polynomial public key encapsulation algorithmOn Dynamical Systems of Large Girth or Cycle Indicator and Their Applications to Multivariate Cryptography


Uses Software





This page was built for publication: Advances in Cryptology - CRYPTO 2003