-
2
-
-
33645607707
-
Complexity of Gröbner basis computations for regular overdetermined systems
-
a slightly modified preprint is accepted by the International Conference on Polynomial System Solving
-
M. Bardet, J.-C. Faugère, and B. Salvy, Complexity of Gröbner Basis Computations for Regular Overdetermined Systems, INRIA Rapport de Recherche No. 5049; a slightly modified preprint is accepted by the International Conference on Polynomial System Solving.
-
INRIA Rapport de Recherche No. 5049
, vol.5049
-
-
Bardet, M.1
Faugère, J.-C.2
Salvy, B.3
-
4
-
-
33749035540
-
Tame transformations signatures with topsy-turvy hashes
-
Taipei
-
J.-M. Chen and B.-Y. Yang, Tame Transformations Signatures With Topsy-Turvy Hashes, proc. IWAP 2002, Taipei.
-
Proc. IWAP 2002
-
-
Chen, J.-M.1
Yang, B.-Y.2
-
5
-
-
33645589742
-
A more secure and efficacious TTS scheme
-
ICISC 2003, full version at eprint.iacr.org/2003/160
-
J.-M. Chen and B.-Y. Yang, A More Secure and Efficacious TTS Scheme, ICISC 2003, LNCS v. 2971, pp. 320-338; full version at eprint.iacr.org/2003/160.
-
LNCS
, vol.2971
, pp. 320-338
-
-
Chen, J.-M.1
Yang, B.-Y.2
-
6
-
-
84949030831
-
Attacks on the birational permutation signature schemes
-
Crypto 1993
-
D. Coppersmith, J. Stern, and S. Vaudenay, Attacks on the Birational Permutation Signature Schemes, Crypto 1993, LNCS v. 773, pp. 435-443.
-
LNCS
, vol.773
, pp. 435-443
-
-
Coppersmith, D.1
Stern, J.2
Vaudenay, S.3
-
7
-
-
84958969583
-
Solving underdefined systems of multivariate quadratic equations
-
PKC 2002
-
N. Courtois, L. Goubin, W. Meier, and J. Tacier, Solving Underdefined Systems of Multivariate Quadratic Equations, PKC 2002, LNCS v. 2274, pp. 211-227
-
LNCS
, vol.2274
, pp. 211-227
-
-
Courtois, N.1
Goubin, L.2
Meier, W.3
Tacier, J.4
-
8
-
-
33947128822
-
Generic attacks and the security of quartz
-
PKC 2003
-
N. Courtois, Generic Attacks and the Security of Quartz, PKC 2003, LNCS v. 2567, pp. 351-364.
-
LNCS
, vol.2567
, pp. 351-364
-
-
Courtois, N.1
-
10
-
-
77649327985
-
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
-
EUROCRYPT 2000
-
N. Courtois, A. Klimov, J. Patarin, and A. Shamir, Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations, EUROCRYPT 2000, LNCS v. 1807, pp. 392-407.
-
LNCS
, vol.1807
, pp. 392-407
-
-
Courtois, N.1
Klimov, A.2
Patarin, J.3
Shamir, A.4
-
11
-
-
35248834096
-
About the XL algorithms over GF(2)
-
CT-RSA 2003
-
N. Courtois and J. Patarin, About the XL Algorithms over GF(2), CT-RSA 2003, LNCS v. 2612, pp. 141-157.
-
LNCS
, vol.2612
, pp. 141-157
-
-
Courtois, N.1
Patarin, J.2
-
13
-
-
24944450905
-
The XL-algorithm and a conjecture from commutative algebra
-
preprint (to appear) and private communication
-
C. Diem, The XL-algorithm and a Conjecture from Commutative Algebra, preprint (to appear Asiacrypt 2004 and LNCS) and private communication.
-
Asiacrypt 2004 and LNCS
-
-
Diem, C.1
-
14
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman, New Directions in Cryptography, IEEE Trans. Info. Theory, vol. IT-22, no. 6, pp. 644-654.
-
IEEE Trans. Info. Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
15
-
-
0033143274
-
A new efficient algorithm for computing Gröbner bases (F4)
-
J.-C. Faugére, A New Efficient Algorithm for Computing Gröbner Bases (F4), Journal of Pure and Applied Algebra, 139 (1999), pp. 61-88.
-
(1999)
Journal of Pure and Applied Algebra
, vol.139
, pp. 61-88
-
-
Faugére, J.-C.1
-
16
-
-
0036045901
-
A new efficient algorithm for computing Gröbner bases without reduction to zero (F5)
-
ACM Press
-
J.-C. Faugère, A New Efficient Algorithm for Computing Gröbner Bases without Reduction to Zero (F5), Proc. ISSAC 2002, pp. 75-83, ACM Press 2002.
-
(2002)
Proc. ISSAC 2002
, pp. 75-83
-
-
Faugère, J.-C.1
-
17
-
-
35248840150
-
Algebraic cryptanalysis of Hidden Field Equations (HFE) cryptosystems using Gröbner bases
-
Crypto 2003
-
J.-C. Faugère and A. Joux, Algebraic Cryptanalysis of Hidden Field Equations (HFE) Cryptosystems Using Gröbner Bases, Crypto 2003, LNCS v. 2729, pp. 44-60.
-
LNCS
, vol.2729
, pp. 44-60
-
-
Faugère, J.-C.1
Joux, A.2
-
19
-
-
84946835010
-
Attacking the affine parts of SPLASH
-
8th International IMA Conference on Cryptography and Coding
-
W. Geiselmann, R. Steinwandt, and T. Beth, Attacking the Affine Parts of SPLASH, 8th International IMA Conference on Cryptography and Coding, LNCS v. 2260, pp. 355-359.
-
LNCS
, vol.2260
, pp. 355-359
-
-
Geiselmann, W.1
Steinwandt, R.2
Beth, T.3
-
21
-
-
84937500998
-
Cryptanalysis of the TTM cryptosystem
-
Asiacrypt 2000
-
L. Goubin and N. Courtois, Cryptanalysis of the TTM cryptosystem, Asiacrypt 2000, LNCS v. 1976, pp. 44-57.
-
LNCS
, vol.1976
, pp. 44-57
-
-
Goubin, L.1
Courtois, N.2
-
22
-
-
84957613067
-
Cryptanalysis of the oil and vinegar signature scheme
-
Crypto'98
-
A. Kipnis and A. Shamir, Cryptanalysis of the Oil and Vinegar Signature Scheme, Crypto'98, LNCS v. 1462, pp. 257-266
-
LNCS
, vol.1462
, pp. 257-266
-
-
Kipnis, A.1
Shamir, A.2
-
23
-
-
84957693117
-
Unbalanced oil and vinegar sigature schemes
-
Crypto'99
-
A. Kipnis, J. Patarin, and L. Goubin, Unbalanced Oil and Vinegar Sigature Schemes, Crypto'99, LNCS v. 1592, pp. 206-222
-
LNCS
, vol.1592
, pp. 206-222
-
-
Kipnis, A.1
Patarin, J.2
Goubin, L.3
-
24
-
-
84957060922
-
Cryptanalysis of the HFE public key cryptosystem by relinearization
-
Crypto'99
-
A. Kipnis and A. Shamir, Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization, Crypto'99, LNCS v. 1666, pp. 19-30
-
LNCS
, vol.1666
, pp. 19-30
-
-
Kipnis, A.1
Shamir, A.2
-
25
-
-
85033537496
-
Public quadratic polynomial-tuples for efficient signature-verification and message-encryption
-
EUROCRYPT'88
-
T. Matsumoto and H. Imai, Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption, EUROCRYPT'88, LNCS v. 330, pp. 419-453.
-
LNCS
, vol.330
, pp. 419-453
-
-
Matsumoto, T.1
Imai, H.2
-
30
-
-
84957640013
-
Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt'88
-
Crypto'95
-
J. Patarin, Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88, Crypto'95, LNCS v. 963, pp. 248-261.
-
LNCS
, vol.963
, pp. 248-261
-
-
Patarin, J.1
-
31
-
-
84947932132
-
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP) two new families of asymmetric algorithms
-
EUROCRYPT'96
-
J. Patarin, Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP) Two New Families of Asymmetric Algorithms, EUROCRYPT'96, LNCS v. 1070, pp. 33-48.
-
LNCS
, vol.1070
, pp. 33-48
-
-
Patarin, J.1
-
32
-
-
84957654670
-
Improved algorithm for isomorphisms of polynomials
-
EUROCRYPT'98
-
J. Patarin, L. Goubin, N. Courtois, Improved Algorithm for Isomorphisms of Polynomials, EUROCRYPT'98, LNCS v. 1403, pp. 184-200.
-
LNCS
, vol.1403
, pp. 184-200
-
-
Patarin, J.1
Goubin, L.2
Courtois, N.3
-
33
-
-
84937576636
-
QUARTZ, 128-bit long digital signatures
-
CT-RSA 2001
-
J. Patarin, N. Courtois, and L. Goubin, QUARTZ, 128-Bit Long Digital Signatures, CT-RSA 2001, LNCS v. 2020, pp. 282-297. Updated version available at http://www.cryptonessie.org.
-
LNCS
, vol.2020
, pp. 282-297
-
-
Patarin, J.1
Courtois, N.2
Goubin, L.3
-
34
-
-
84937571034
-
FLASH, a fast multivariate signature algorithm
-
CT-RSA 2001
-
J. Patarin, N. Courtois, and L. Goubin, FLASH, a Fast Multivariate Signature Algorithm, CT-RSA 2001, LNCS v. 2020, pp. 298-307. Updated version available at http://www.cryptonessie.org.
-
LNCS
, vol.2020
, pp. 298-307
-
-
Patarin, J.1
Courtois, N.2
Goubin, L.3
-
35
-
-
35248849882
-
Factoring large numbers with the TWIRL device
-
Crypto 2003
-
A. Shamir and E. Tromer, Factoring Large Numbers with the TWIRL Device, Crypto 2003, LNCS v. 2729, pp. 1-26.
-
LNCS
, vol.2729
, pp. 1-26
-
-
Shamir, A.1
Tromer, E.2
-
39
-
-
79952541213
-
All in the XL family: Theory and practice
-
to appear at
-
B.-Y. Yang and J.-M. Chen, All in the XL Family: Theory and Practice, to appear at ICISC 2004 and LNCS.
-
ICISC 2004 and LNCS
-
-
Yang, B.-Y.1
Chen, J.-M.2
-
40
-
-
35048900285
-
TTS: High-speed signatures on a low-end smart card
-
Proc. CHES '04
-
B.-Y. Yang, Y.-H. Chen, and J.-M. Chen, TTS: High-Speed Signatures on a Low-End Smart Card, Proc. CHES '04, LNCS v. 3156, pp. 371-385.
-
LNCS
, vol.3156
, pp. 371-385
-
-
Yang, B.-Y.1
Chen, Y.-H.2
Chen, J.-M.3
-
41
-
-
33646811417
-
On asymptotic security estimates in XL and Gröbner bases-related algebraic cryptanalysis
-
ICICS 2004
-
B.-Y. Yang, J.-M. Chen, and N. Courtois, On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis, ICICS 2004, LNCS v. 3269, pp. 401-413.
-
LNCS
, vol.3269
, pp. 401-413
-
-
Yang, B.-Y.1
Chen, J.-M.2
Courtois, N.3
|