scientific article; zbMATH DE number 1925556
From MaRDI portal
Publication:4707231
Recommendations
- Cryptanalysis of Polly Cracker
- A ciphertext-only attack on Polly Two
- Lattice polly cracker cryptosystems
- Public Key Cryptography – PKC 2004
- Polytopic cryptanalysis
- Polly Two -- a public-key cryptosystem based on Polly Cracker
- Private key extension of Polly Cracker cryptosystems
- scientific article; zbMATH DE number 4081459
- Polynomial evaluation and side channel analysis
- scientific article; zbMATH DE number 1612518
Cited in
(18)- Polly Two: a new algebraic polynomial-based public-key scheme
- A ciphertext-only attack on Polly Two
- Polly cracker, revisited
- Polly cracker, revisited
- Polly Two -- a public-key cryptosystem based on Polly Cracker
- Lattice polly cracker cryptosystems
- Chosen ciphertext attacks as common vulnerability of some group- and polynomial-based encryption schemes
- A survey on Polly Cracker systems
- Why you cannot even hope to use Ore algebras in cryptography
- scientific article; zbMATH DE number 1618046 (Why is no real title available?)
- scientific article; zbMATH DE number 2127871 (Why is no real title available?)
- Polly cracker, revisited, revisited
- A Polynomial-Time Attack on the BBCRS Scheme
- Private key extension of Polly Cracker cryptosystems
- Polynomial structures in code-based cryptography
- A polynomial-time algorithm for breaking the basic Merkle - Hellman cryptosystem
- Why you cannot even hope to use Gröbner bases in cryptography: an eternal golden braid of failures
- Crypto galore!
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4707231)