scientific article; zbMATH DE number 1925556
From MaRDI portal
Publication:4707231
DOI10.1007/S10207-002-0012-2zbMATH Open1047.68069OpenAlexW17511354MaRDI QIDQ4707231FDOQ4707231
Authors: Rainer Steinwandt, Regine Endsuleit, Willi Geiselmann
Publication date: 2002
Published in: International Journal of Information Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10207-002-0012-2
Title of this publication is not available (Why is that?)
Recommendations
- Cryptanalysis of Polly Cracker
- A ciphertext-only attack on Polly Two
- Lattice polly cracker cryptosystems
- Public Key Cryptography – PKC 2004
- Polytopic cryptanalysis
- Polly Two -- a public-key cryptosystem based on Polly Cracker
- Private key extension of Polly Cracker cryptosystems
- scientific article; zbMATH DE number 4081459
- Polynomial evaluation and side channel analysis
- scientific article; zbMATH DE number 1612518
Cited In (18)
- Polly Two: a new algebraic polynomial-based public-key scheme
- A ciphertext-only attack on Polly Two
- Polly cracker, revisited
- Polly cracker, revisited
- Polly Two -- a public-key cryptosystem based on Polly Cracker
- Lattice polly cracker cryptosystems
- Chosen ciphertext attacks as common vulnerability of some group- and polynomial-based encryption schemes
- A survey on Polly Cracker systems
- Title not available (Why is that?)
- Title not available (Why is that?)
- Why you cannot even hope to use Ore algebras in cryptography
- Polly cracker, revisited, revisited
- A Polynomial-Time Attack on the BBCRS Scheme
- Private key extension of Polly Cracker cryptosystems
- Polynomial structures in code-based cryptography
- A polynomial-time algorithm for breaking the basic Merkle - Hellman cryptosystem
- Why you cannot even hope to use Gröbner bases in cryptography: an eternal golden braid of failures
- Crypto galore!
Uses Software
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4707231)