FGb
From MaRDI portal
Cited in
(only showing first 100 items - show all)- M4GB. An efficient Gröbner-basis algorithm
- Computing loci of rank defects of linear matrices using Gröbner bases and applications to cryptology
- Fast algorithm for change of ordering of zero-dimensional Gröbner bases with sparse multiplication matrices
- On the complexity of solving quadratic Boolean systems
- The number of realizations of a Laman graph
- Probabilistic Algorithm for Polynomial Optimization over a Real Algebraic Set
- Automated Deduction in Geometry
- Public-key cryptography from new multivariate quadratic assumptions
- Combinatorial Image Analysis
- The center problem for a \({1:-4}\) resonant quadratic system
- Geospatial algebraic computations. Theory and applications
- Breaking an identity-based encryption scheme based on DHIES
- Structural cryptanalysis of McEliece schemes with compact keys
- Degeneracy loci and polynomial equation solving
- The F5 algorithm in Buchberger's style
- scientific article; zbMATH DE number 2151220 (Why is no real title available?)
- Controlled non-uniform random generation of decomposable structures
- scientific article; zbMATH DE number 2231485 (Why is no real title available?)
- Cryptanalysis of the TRMS Signature Scheme of PKC’05
- Toward a Rigorous Variation of Coppersmith’s Algorithm on Three Variables
- When Stream Cipher Analysis Meets Public-Key Cryptography
- Recognizing graph theoretic properties with polynomial ideals
- Inverting HFE systems is quasi-polynomial for all fields
- scientific article; zbMATH DE number 1984327 (Why is no real title available?)
- Numerical homotopies to compute generic points on positive dimensional algebraic sets
- Information Security and Privacy
- Linear independence oracles and applications to rectangular and low rank linear systems
- Robots, computer algebra and eight connected components
- Real Schubert Calculus: Polynomial Systems and a Conjecture of Shapiro and Shapiro
- scientific article; zbMATH DE number 1950612 (Why is no real title available?)
- Methods to solve algebraic equations in cryptanalysis
- Solving equation systems by agreeing and learning
- The membrane inclusions curvature equations
- On selection of nonmultiplicative prolongations in computation of Janet bases
- Analysis of Trivium using compressed right hand side equations
- The \({1:-q}\) resonant center problem for certain cubic Lotka-Volterra systems
- Algebraic approaches to stability analysis of biological systems
- Linearizability of linear systems perturbed by fifth degree homogeneous polynomials
- Solving parametric systems of polynomial equations over the reals through Hermite matrices
- Critical points and Gröbner bases: the unmixed case
- Advanced Encryption Standard – AES
- Information Security and Privacy
- Implicit equations of the Henneberg-type minimal surface in the four-dimensional Euclidean space
- scientific article; zbMATH DE number 2125578 (Why is no real title available?)
- Progress in Cryptology - INDOCRYPT 2003
- scientific article; zbMATH DE number 1504686 (Why is no real title available?)
- Secure Variants of the Square Encryption Scheme
- scientific article; zbMATH DE number 1795734 (Why is no real title available?)
- Algorithms in real algebraic geometry
- Algorithms in real algebraic geometry
- Comparison Between XL and Gröbner Basis Algorithms
- Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries
- More on the Security of Linear RFID Authentication Protocols
- Lower bounds on the number of realizations of rigid graphs
- The implementation and complexity analysis of the branch Gröbner bases algorithm over Boolean polynomial rings
- Solving rank-constrained semidefinite programs in exact arithmetic
- Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects
- Decomposition of generic multivariate polynomials
- On the decoding of binary cyclic codes with the Newton identities
- Solving rank-constrained semidefinite programs in exact arithmetic
- Information Security and Cryptology - ICISC 2003
- scientific article; zbMATH DE number 2085432 (Why is no real title available?)
- Cryptography and Coding
- Geometric ideas for cryptographic equation solving in even characteristic
- Advances in Cryptology - CRYPTO 2003
- Coding and Cryptography
- Topics in Cryptology – CT-RSA 2006
- Involutive method for computing Gröbner bases over \(\mathbb F_2\)
- Algebraic, AIDA/Cube and side channel analysis of KATAN family of block ciphers
- Solving systems of polynomial equations over Galois–Eisenstein rings with the use of the canonical generating systems of polynomial ideals
- A probabilistic algorithm for computing data-discriminants of likelihood equations
- QUAD: A multivariate stream cipher with provable security
- A new efficient algorithm for computing Gröbner bases (F₄)
- On conversions from CNF to ANF
- Generalization of the F5 algorithm for calculating Gröbner bases for polynomial ideals
- F5C: A variant of Faugère's F5 algorithm with reduced Gröbner bases
- An algorithm for deciding zero equivalence of nested polynomially recurrent sequences
- On the Discrete Logarithm Problem on Algebraic Tori
- On the computation of rational solutions of underdetermined systems over a finite field
- Using Wiedemann’s Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks
- Irreducible decomposition of curves
- Central configurations of the 5-body problem with equal masses in three-space
- Symbolic-numeric methods for solving polynomial equations and applications
- Computing Gröbner Bases within Linear Algebra
- Strong Gröbner bases for polynomials over a principal ideal ring.
- Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants
- scientific article; zbMATH DE number 5052246 (Why is no real title available?)
- On the relation between the MXL family of algorithms and Gröbner basis algorithms
- Isochronicity conditions for some planar polynomial systems
- Isochronicity conditions for some planar polynomial systems. II.
- Computing Equiangular Lines in Complex Space
- Algebraic cryptanalysis of McEliece variants with compact keys
- Public Key Cryptography - PKC 2005
- Cryptanalysis of HFE with Internal Perturbation
- A geometric view of cryptographic equation solving
- Mathematical software -- ICMS 2010. Third international congress on mathematical software, Kobe, Japan, September 13--17, 2010. Proceedings
- Cryptanalysis of the hidden matrix cryptosystem
- Algebraic aspects of the advanced encryption standard.
- Algebraic invariants of graphs; a study based on computer exploration
- Truncated normal forms for solving polynomial systems: generalized and efficient algorithms
This page was built for software: FGb