Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations
From MaRDI portal
Publication:3498391
DOI10.1007/978-3-540-76900-2_26zbMath1153.11343OpenAlexW166560619MaRDI QIDQ3498391
Publication date: 15 May 2008
Published in: Advances in Cryptology – ASIACRYPT 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-76900-2_26
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Number-theoretic algorithms; complexity (11Y16)
Related Items (5)
Homomorphic Encryption and Some Black Box Attacks ⋮ On the analysis of cryptographic assumptions in the generic ring model ⋮ Adjoint representations of black box groups \(\operatorname{PSL}_2(\mathbb{F}_q)\) ⋮ Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs ⋮ Computing primitive idempotents in finite commutative rings and applications
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Algorithms for Black-Box Fields and their Application to Cryptography
- Finding Isomorphisms Between Finite Fields
- Processing encrypted data
- New directions in cryptography
- The Relationship Between Breaking the Diffie--Hellman Protocol and Computing Discrete Logarithms
- Cryptography and Coding
- Factoring polynomials over special finite fields
This page was built for publication: Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations