Cryptanalysis of 2R− Schemes
From MaRDI portal
Publication:5756652
DOI10.1007/11818175_21zbMath1161.94397OpenAlexW2140702311MaRDI QIDQ5756652
Ludovic Perret, Jean-Charles Faugère
Publication date: 4 September 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11818175_21
Symbolic computation and algebraic computation (68W30) Cryptography (94A60) Gröbner bases; other bases for ideals and modules (e.g., Janet and border bases) (13P10)
Related Items (8)
Key-recovery attacks on \(\mathsf{ASASA}\) ⋮ Cryptanalysis of the TRMS Signature Scheme of PKC’05 ⋮ On the relation between the MXL family of algorithms and Gröbner basis algorithms ⋮ Cryptanalysis of Rational Multivariate Public Key Cryptosystems ⋮ On functional decomposition of multivariate polynomials with differentiation and homogenization ⋮ On Multivariate Homogeneous Polynomial Decomposition ⋮ An efficient algorithm for decomposing multivariate polynomials and its applications to cryptography ⋮ Gröbner bases for finite-temperature quantum computing and their complexity
This page was built for publication: Cryptanalysis of 2R− Schemes