On the security of stepwise triangular systems
DOI10.1007/s10623-006-0015-5zbMath1210.94094DBLPjournals/dcc/WolfBP06OpenAlexW1978927998WikidataQ62045620 ScholiaQ62045620MaRDI QIDQ851759
Bart Preneel, An Braeken, Christopher A. Wolf
Publication date: 22 November 2006
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-813.pdf
Analysis of algorithms and problem complexity (68Q25) Analysis of algorithms (68W40) Cryptography (94A60) Enumerative problems (combinatorial problems) in algebraic geometry (14N10) Arithmetic theory of polynomial rings over finite fields (11T55) Other finite linear geometries (51E26) Computational aspects in algebraic geometry (14Q99) Field extensions (12F99)
Related Items (6)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The security of the birational permutation signature schemes
- Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
- A public key system with signature and master key functions
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Progress in Cryptology – Mycrypt 2005
- Security in Communication Networks
This page was built for publication: On the security of stepwise triangular systems