Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic
DOI10.1007/S10623-012-9617-2zbMATH Open1307.13031OpenAlexW2093643075WikidataQ114226851 ScholiaQ114226851MaRDI QIDQ356715FDOQ356715
Luk Bettale, Jean-Charles Faugère, Ludovic Perret
Publication date: 26 July 2013
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://hal.inria.fr/hal-00776072/file/MAYA2-UPMCINRIA-v1-key_recovery_on_HFE_2.0.pdf
Recommendations
[https://portal.mardi4nfdi.de/w/index.php?title=+Special%3ASearch&search=Gr%EF%BF%BD%EF%BF%BDbner+bases&go=Go Gr��bner bases]hidden field equationsminrank
Cryptography (94A60) Gröbner bases; other bases for ideals and modules (e.g., Janet and border bases) (13P10) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Cites Work
- The Magma algebra system. I: The user language
- FGb: A Library for Computing Gröbner Bases
- Title not available (Why is that?)
- A probabilistic remark on algebraic program testing
- A new efficient algorithm for computing Gröbner bases \((F_4)\)
- An algorithm for finding the basis elements of the residue class ring of a zero dimensional polynomial ideal
- Title not available (Why is that?)
- Fast Probabilistic Algorithms for Verification of Polynomial Identities
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Comments on the translation of my PhD thesis: ``An algorithm for finding the basis elements of the residue class ring of a zero dimensional polynomial ideal
- Bruno Buchberger's PhD thesis 1965: An algorithm for finding the basis elements of the residue class ring of a zero dimensional polynomial ideal. Translation from the German
- Advances in Cryptology - CRYPTO 2003
- Title not available (Why is that?)
- Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
- Title not available (Why is that?)
- A public key system with signature and master key functions
- Title not available (Why is that?)
- The computational complexity of some problems of linear algebra
- On the complexity of the generalized MinRank problem
- Computing loci of rank defects of linear matrices using Gröbner bases and applications to cryptology
- Equivalent keys in ℳultivariate uadratic public key systems
- The Degree of Regularity of HFE Systems
- Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants
- Hybrid approach for solving multivariate systems over finite fields
- Algebraic Attack on HFE Revisited
- Cryptanalysis of MinRank
- Kipnis-Shamir Attack on HFE Revisited
- SSE Implementation of Multivariate PKCs on Modern x86 CPUs
- An inequality for Hilbert series of graded algebras.
- Unbalanced Oil and Vinegar Signature Schemes
- Title not available (Why is that?)
- Inverting HFE Systems Is Quasi-Polynomial for All Fields
- Progress in Cryptology – Mycrypt 2005
- Public Key Cryptography - PKC 2005
- Public Key Cryptography - PKC 2005
- Inverting HFE Is Quasipolynomial
- Gröbner bases of bihomogeneous ideals generated by polynomials of bidegree \((1,1)\): algorithms and complexity
Cited In (42)
- The Complexity of MinRank
- Total break of the SRP encryption scheme
- Cryptanalysis of the Square cryptosystems
- Boolean ring cryptographic equation solving
- A multivariate cryptosystem inspired by random linear codes
- First fall degree and Weil descent
- All in the \(C^*\) family
- New practical multivariate signatures from a nonlinear modifier
- On the effect of projection on rank attacks in multivariate cryptography
- Efficient key recovery for all HFE signature variants
- Recent Developments in Multivariate Public Key Cryptosystems
- Advances in Cryptology - CRYPTO 2003
- Differential Properties of the HFE Cryptosystem
- Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants
- Cryptanalysis of HFE with Internal Perturbation
- On the last fall degree of zero-dimensional Weil descent systems
- High-rank attack on HMFEv
- Chosen ciphertext attack on ZHFE
- Public Key Cryptography - PKC 2005
- Kipnis-Shamir Attack on HFE Revisited
- On the last fall degree of Weil descent polynomial systems
- A polynomial time key-recovery attack on the Sidon cryptosystem
- An improved signature model of multivariate polynomial public key cryptosystem against key recovery attack
- Efficient public-key operation in multivariate schemes
- On product decomposition
- Improved cryptanalysis of HFERP
- Cryptanalysis of 2R− Schemes
- A new encryption scheme for multivariate quadratic systems
- MI-T-HFE, A New Multivariate Signature Scheme
- Cryptanalysis of the extension field cancellation cryptosystem
- A Rank Attack Against Extension Field Cancellation
- Polynomial-time algorithms for quadratic isomorphism of polynomials: the regular case
- Security analysis via algebraic attack against ``a new encryption scheme for multivariate quadratic system
- DME: A Full Encryption, Signature and KEM Multivariate Public Key Cryptosystem
- Inverting HFE Is Quasipolynomial
- Generalization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key Encryption
- Cryptanalysis of two quartic encryption schemes and one improved MFE scheme
- An Efficient Provable Distinguisher for HFE
- Analysis of multivariate encryption schemes: application to Dob and \(C^*\)
- 2F -- a new method for constructing efficient multivariate encryption schemes
- Improving support-minors rank attacks: applications to G\textit{e}MSS and Rainbow
- EFLASH: a new multivariate encryption scheme
Uses Software
This page was built for publication: Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q356715)