Key-recovery attacks on ASASA
From MaRDI portal
Publication:2413617
DOI10.1007/S00145-017-9272-XzbMATH Open1400.94166OpenAlexW2768348791MaRDI QIDQ2413617FDOQ2413617
Authors: Brice Minaud, Patrick Derbez, Pierre-Alain Fouque, Pierre Karpman
Publication date: 14 September 2018
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-017-9272-x
Recommendations
Cites Work
- On lattices, learning with errors, random linear codes, and cryptography
- On solving LPN using BKW and variants, Implementation and analysis
- On the Influence of the Algebraic Degree of $F^{-1}$ on the Algebraic Degree of $G \circ F$
- An Improved LPN Algorithm
- Cube Attacks on Tweakable Black Box Polynomials
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - CRYPTO 2003
- Noise-tolerant learning, the parity problem, and the statistical query model
- Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
- Practical Cryptanalysis of SFLASH
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Cryptanalysis of 2R− Schemes
- Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants
- Title not available (Why is that?)
- Decomposition of generic multivariate polynomials
- Title not available (Why is that?)
- Title not available (Why is that?)
- High order derivatives and decomposition of multivariate polynomials
- An efficient algorithm for decomposing multivariate polynomials and its applications to cryptography
- A family of trapdoor ciphers
- Title not available (Why is that?)
- Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
- Polynomial Decompositions in Polynomial Time
- Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions
- Public-Key Cryptography from New Multivariate Quadratic Assumptions
- Public Key Cryptography – PKC 2004
- Cryptanalysis of HFE with Internal Perturbation
- Algorithmic regularity for polynomials and applications
- Title not available (Why is that?)
Cited In (7)
- An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme
- Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
- Implicit white-box implementations: white-boxing ARX ciphers
- From distinguishers to key recovery: improved related-key attacks on Even-Mansour
- \textit{Caveat implementor!} Key recovery attacks on MEGA
- Improved key-recovery attacks on reduced-round WEM-8
- A white-box speck implementation using self-equivalence encodings
Uses Software
This page was built for publication: Key-recovery attacks on \(\mathsf{ASASA}\)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2413617)