Cryptanalysis of 2R− Schemes
From MaRDI portal
Publication:5756652
DOI10.1007/11818175_21zbMath1161.94397MaRDI QIDQ5756652
Ludovic Perret, Jean-Charles Faugère
Publication date: 4 September 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11818175_21
68W30: Symbolic computation and algebraic computation
94A60: Cryptography
13P10: Gröbner bases; other bases for ideals and modules (e.g., Janet and border bases)
Related Items
On the relation between the MXL family of algorithms and Gröbner basis algorithms, On functional decomposition of multivariate polynomials with differentiation and homogenization, An efficient algorithm for decomposing multivariate polynomials and its applications to cryptography, Key-recovery attacks on \(\mathsf{ASASA}\), Gröbner bases for finite-temperature quantum computing and their complexity, Cryptanalysis of the TRMS Signature Scheme of PKC’05, Cryptanalysis of Rational Multivariate Public Key Cryptosystems, On Multivariate Homogeneous Polynomial Decomposition