메뉴 건너뛰기




Volumn 3506, Issue , 2005, Pages 67-86

All in the XL family: Theory and practice

Author keywords

Algebraic analysis; Finite field; Gr bner Bases; Multivariate cryptography; Multivariate quadratics; XL

Indexed keywords

ALGORITHMS; COMPUTATION THEORY; LINEAR ALGEBRA; PROBLEM SOLVING; QUADRATIC PROGRAMMING;

EID: 24944535234     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11496618_7     Document Type: Conference Paper
Times cited : (48)

References (60)
  • 1
    • 3042547883 scopus 로고    scopus 로고
    • A fast and secure implementation of SPLASH
    • PKC 2003
    • M. Akkar, N. Courtois, R. Duteuil, and L. Goubin, A Fast and Secure Implementation of SPLASH, PKC 2003, LNCS 2567, pp. 267-278.
    • LNCS , vol.2567 , pp. 267-278
    • Akkar, M.1    Courtois, N.2    Duteuil, R.3    Goubin, L.4
  • 2
    • 84861246468 scopus 로고    scopus 로고
    • Comparison of XL and gröbner bases algorithms over finite fields
    • ASIACRYPT'04
    • G. Ars and J.-C. Faugère, H. Imai, M. Kawazoe, and M. Sugita, Comparison of XL and Gröbner Bases Algorithms over Finite Fields, ASIACRYPT'04, LNCS 3329, pp. 338-353.
    • LNCS , vol.3329 , pp. 338-353
    • Ars, G.1    Faugère, J.-C.2    Imai, H.3    Kawazoe, M.4    Sugita, M.5
  • 4
    • 33746062308 scopus 로고    scopus 로고
    • Complexity of gröbner basis computations for regular overdetermined systems
    • INRIA Rapport de Recherche No. 5049; a slightly modified preprint is accepted by the
    • M. Bardet, J.-C. Faugère, and B. Salvy, Complexity of Gröbner Basis Computations for Regular Overdetermined Systems, INRIA Rapport de Recherche No. 5049; a slightly modified preprint is accepted by the International Conference on Polynomial System Solving.
    • International Conference on Polynomial System Solving
    • Bardet, M.1    Faugère, J.-C.2    Salvy, B.3
  • 6
    • 0000239575 scopus 로고
    • Why you cannot even hope to use gröbner bases in public-key cryptography
    • B. Barkee et al, Why You Cannot Even Hope to Use Gröbner Bases in Public-Key Cryptography, J. Symbolic Computations, 18 (1994), pp. 497-501.
    • (1994) J. Symbolic Computations , vol.18 , pp. 497-501
    • Barkee, B.1
  • 7
    • 84968505384 scopus 로고
    • Triangular factorizations and inversion by fast matrix multiplication
    • J. R. Bunch and J. E. Hopcroft, Triangular Factorizations and Inversion by Fast Matrix Multiplication, Math. Computations, 24 (1974), pp. 231-236.
    • (1974) Math. Computations , vol.24 , pp. 231-236
    • Bunch, J.R.1    Hopcroft, J.E.2
  • 9
    • 24944516448 scopus 로고    scopus 로고
    • preprint, stated to be superseded by a yet unpublished version
    • D. Bernstein, Matrix Inversion Made Difficult, preprint, stated to be superseded by a yet unpublished version, available at http://cr.yp.to.
    • Matrix Inversion Made Difficult
    • Bernstein, D.1
  • 10
    • 85027644628 scopus 로고
    • Some new effectivity bounds in computational geometry
    • AAECC-6
    • L. Caniglia, A. Galligo, and J. Heintz, Some New Effectivity Bounds in Computational Geometry, AAECC-6, 1988, LNCS 357, pp. 131-151.
    • (1988) LNCS , vol.357 , pp. 131-151
    • Caniglia, L.1    Galligo, A.2    Heintz, J.3
  • 11
    • 0001804016 scopus 로고
    • Equations for the protective closure and effective nullstellensatz
    • L. Caniglia, A. Galligo, and J. Heintz, Equations for the Protective Closure and Effective Nullstellensatz, Discrete Applied Mathematics, 33 (1991), pp. 11-23.
    • (1991) Discrete Applied Mathematics , vol.33 , pp. 11-23
    • Caniglia, L.1    Galligo, A.2    Heintz, J.3
  • 12
    • 84975960876 scopus 로고
    • An extension of the method of steepest descents
    • C. Chester, B. Friedman, and F. Ursell, An Extension of the Method of Steepest Descents, Proc. Camb. Philo. Soc. 53 (1957) pp. 599-611.
    • (1957) Proc. Camb. Philo. Soc. , vol.53 , pp. 599-611
    • Chester, C.1    Friedman, B.2    Ursell, F.3
  • 13
    • 24944463551 scopus 로고    scopus 로고
    • private communication
    • D. Coppersmith, private communication.
    • Coppersmith, D.1
  • 14
    • 84937560136 scopus 로고    scopus 로고
    • The security of Hidden Field Equations (HFE)
    • CT-RSA 2001
    • N. Courtois, The Security of Hidden Field Equations (HFE), CT-RSA 2001, LNCS 2020, pp. 266-281.
    • LNCS , vol.2020 , pp. 266-281
    • Courtois, N.1
  • 15
    • 35248828626 scopus 로고    scopus 로고
    • Higher-order correlation attacks, XL algorithm and cryptanalysis of toyocrypt
    • ICISC '02
    • N. Courtois, Higher-Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt, ICISC '02, LNCS 2587, pp. 182-199.
    • LNCS , vol.2587 , pp. 182-199
    • Courtois, N.1
  • 16
    • 35248849880 scopus 로고    scopus 로고
    • Fast algebraic attacks on stream ciphers with linear feedback
    • CRYPTO'03
    • N. Courtois, Fast Algebraic Attacks on Stream Ciphers with Linear Feedback, CRYPTO'03, LNCS 2729, pp. 177-194.
    • LNCS , vol.2729 , pp. 177-194
    • Courtois, N.1
  • 17
    • 84943322182 scopus 로고    scopus 로고
    • v2
    • PKC '04
    • v2, PKC '04, LNCS 2947, pp. 201-217.
    • LNCS , vol.2947 , pp. 201-217
    • Courtois, N.1
  • 18
    • 24944475874 scopus 로고    scopus 로고
    • private communication
    • N. Courtois, private communication.
    • Courtois, N.1
  • 20
    • 77649327985 scopus 로고    scopus 로고
    • Efficient algorithms for solving overdefined systems of multivariate polynomial equations
    • EUROCRYPT 2000
    • N. Courtois, A. Klimov, J. Patarin, and A. Shamir, Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations, EUROCRYPT 2000, LNCS 1807, pp. 392-407.
    • LNCS , vol.1807 , pp. 392-407
    • Courtois, N.1    Klimov, A.2    Patarin, J.3    Shamir, A.4
  • 21
    • 84958765510 scopus 로고    scopus 로고
    • Cryptanalysis of block ciphers with overdefined systems of equations
    • ASIACRYPT 2002
    • N. Courtois and J. Pieprzyk, Cryptanalysis of Block Ciphers with Overdefined Systems of Equations, ASIACRYPT 2002, LNCS 2501, pp. 267-287.
    • LNCS , vol.2501 , pp. 267-287
    • Courtois, N.1    Pieprzyk, J.2
  • 22
    • 35248834096 scopus 로고    scopus 로고
    • About the XL algorithm over GF(2)
    • CT-RSA 2003
    • N. Courtois and J. Patarin, About the XL Algorithm over GF(2), CT-RSA 2003, LNCS 2612, pp. 141-157.
    • LNCS , vol.2612 , pp. 141-157
    • Courtois, N.1    Patarin, J.2
  • 24
    • 24944450905 scopus 로고    scopus 로고
    • The XL-algorithm and a conjecture from commutative algebra
    • ASIACRYPT'04, and private communication
    • C. Diem, The XL-algorithm and a Conjecture from Commutative Algebra, ASIACRYPT'04, LNCS 3329, pp. 323-337 and private communication.
    • LNCS , vol.3329 , pp. 323-337
    • Diem, C.1
  • 25
    • 0017018484 scopus 로고
    • New directions in cryptography
    • W. Diffie and M. Hellman, New Directions in Cryptography, IEEE Trans. Info. Theory, vol. IT-22, 6 (1972), pp. 644-654.
    • (1972) IEEE Trans. Info. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 28
    • 0030702656 scopus 로고    scopus 로고
    • On randomized lanczos algorithms
    • ACM Press
    • W. Eberly and E. Kaltofen, On Randomized Lanczos Algorithms, Proc. ISSAC '97, pp. 176-183, ACM Press 1997.
    • (1997) Proc. ISSAC '97 , pp. 176-183
    • Eberly, W.1    Kaltofen, E.2
  • 29
    • 0033143274 scopus 로고    scopus 로고
    • A new efficient algorithm for computing gröbner bases (F4)
    • J.-C. Faugére, A New Efficient Algorithm for Computing Gröbner Bases (F4), Journal of Pure and Applied Algebra, 139 (1999), pp. 61-88.
    • (1999) Journal of Pure and Applied Algebra , vol.139 , pp. 61-88
    • Faugére, J.-C.1
  • 30
    • 0036045901 scopus 로고    scopus 로고
    • A new efficient algorithm for computing gröbner bases without reduction to zero (F5)
    • ACM Press
    • J.-C. Faugère, A New Efficient Algorithm for Computing Gröbner Bases without Reduction to Zero (F5), Proceedings of ISSAC 2002, pp. 75-83, ACM Press 2002.
    • (2002) Proceedings of ISSAC 2002 , pp. 75-83
    • Faugère, J.-C.1
  • 31
    • 35248840150 scopus 로고    scopus 로고
    • Algebraic cryptanalysis of Hidden Field Equations (HFE) cryptosystems using gröbner bases
    • CRYPTO 2003
    • J.-C. Faugère and A. Joux, Algebraic Cryptanalysis of Hidden Field Equations (HFE) Cryptosystems Using Gröbner Bases, CRYPTO 2003, LNCS 2729, pp. 44-60.
    • LNCS , vol.2729 , pp. 44-60
    • Faugère, J.-C.1    Joux, A.2
  • 32
    • 0001511869 scopus 로고
    • An inequality for hubert series of graded algebras
    • R. Fröberg, An Inequality for Hubert Series of Graded Algebras, Math. Scand. 56(1985) pp. 117-144.
    • (1985) Math. Scand. , vol.56 , pp. 117-144
    • Fröberg, R.1
  • 35
    • 0040095805 scopus 로고    scopus 로고
    • Asymptotic estimates of elementary probability distributions
    • H.-K. Hwang, Asymptotic estimates of elementary probability distributions, Studies in Applied Mathematics, 99:4 (1997), pp. 393-417.
    • (1997) Studies in Applied Mathematics , vol.99 , Issue.4 , pp. 393-417
    • Hwang, H.-K.1
  • 37
    • 84957060922 scopus 로고    scopus 로고
    • Cryptanalysis of the HFE public key cryptosystem by relinearization
    • CRYPTO'99
    • A. Kipnis and A. Shamir, Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization, CRYPTO'99, LNCS 1666, pp. 19-30.
    • LNCS , vol.1666 , pp. 19-30
    • Kipnis, A.1    Shamir, A.2
  • 38
    • 84988216913 scopus 로고    scopus 로고
    • Solving large sparse linear systems over finite fields
    • CRYPTO'90
    • B. LaMacchia and A. Odlyzko, Solving Large Sparse Linear Systems over Finite Fields, CRYPTO'90, LNCS 537, pp. 109-133.
    • LNCS , vol.537 , pp. 109-133
    • LaMacchia, B.1    Odlyzko, A.2
  • 40
    • 85034440461 scopus 로고    scopus 로고
    • Gröbner bases, Gaussian elimination and resolution of systems of algebraic equations
    • EUROCAL '83
    • D. Lazard, Gröbner Bases, Gaussian Elimination and Resolution of Systems of Algebraic Equations, EUROCAL '83, LNCS 162, pp. 146-156.
    • LNCS , vol.162 , pp. 146-156
    • Lazard, D.1
  • 41
    • 24944587417 scopus 로고
    • Veni, divisi, vici
    • Appearing in the "Computer Science Sampler" column of the, May
    • C. McGeoch, "Veni, Divisi, Vici", Appearing in the "Computer Science Sampler" column of the Amer. Math. Monthly, May 1995.
    • (1995) Amer. Math. Monthly
    • McGeoch, C.1
  • 42
    • 84861248699 scopus 로고    scopus 로고
    • The MAGMA project, University of Sydney, see http://magma.maths.usyd.edu. au/users/allan/gb
  • 43
    • 85033537496 scopus 로고    scopus 로고
    • Public quadratic polynomial-tuples for efficient signature-verification and message-encryption
    • EUROCRYPT'88
    • T. Matsumoto and H. Imai, Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption, EUROCRYPT'88, LNCS 330, pp. 419-453.
    • LNCS , vol.330 , pp. 419-453
    • Matsumoto, T.1    Imai, H.2
  • 45
    • 84937413721 scopus 로고    scopus 로고
    • Essential algebraic structures within the AES
    • CRYPTO 2002
    • S. Murphy and M. Robshaw, Essential Algebraic Structures Within the AES, CRYPTO 2002, LNCS 2442, pp. 1-16.
    • LNCS , vol.2442 , pp. 1-16
    • Murphy, S.1    Robshaw, M.2
  • 48
    • 84947932132 scopus 로고    scopus 로고
    • Hidden Fields Equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms
    • EUROCRYPT'96
    • J. Patarin, Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms, EUROCRYPT'96, LNCS 1070, pp. 33-48.
    • LNCS , vol.1070 , pp. 33-48
    • Patarin, J.1
  • 49
    • 84947768941 scopus 로고    scopus 로고
    • -+* and HM: Variations around two schemes of T. Matsumoto and H. Imai
    • ASIACRYPT'98
    • -+* and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai, ASIACRYPT'98, LNCS 1514, pp. 35-49.
    • LNCS , vol.1514 , pp. 35-49
    • Patarin, J.1    Goubin, L.2    Courtois, N.3
  • 50
    • 84937576636 scopus 로고    scopus 로고
    • QUARTZ, 128-bit long digital signatures
    • CT-RSA 2001
    • J. Patarin, N. Courtois, and L. Goubin, QUARTZ, 128-Bit Long Digital Signatures, CT-RSA 2001, LNCS 2020, pp. 282-297. Update at http://www. cryptonessie.org
    • LNCS , vol.2020 , pp. 282-297
    • Patarin, J.1    Courtois, N.2    Goubin, L.3
  • 52
    • 0003652674 scopus 로고    scopus 로고
    • second printing 1996; vol. 2 in 1999. Both published by Cambridge University Press, Cambridge
    • R. Stanley, Enumerative Combinatorics, vol. 1, second printing 1996; vol. 2 in 1999. Both published by Cambridge University Press, Cambridge.
    • Enumerative Combinatorics , vol.1
    • Stanley, R.1
  • 53
    • 34250487811 scopus 로고
    • Gaussian elimination is not optimal
    • V. Strassen, Gaussian Elimination is not Optimal, Numer. Math. 13 (1969) pp. 354-356.
    • (1969) Numer. Math. , vol.13 , pp. 354-356
    • Strassen, V.1
  • 56
    • 0022583143 scopus 로고
    • Solving sparse linear equations over finite fields
    • D. Wiedemann, Solving Sparse Linear Equations over Finite Fields, IEEE Transaction on Information Theory, v. IT-32 (1976), no. 1, pp. 54-62.
    • (1976) IEEE Transaction on Information Theory , vol.IT-32 , Issue.1 , pp. 54-62
    • Wiedemann, D.1
  • 58
    • 33646770907 scopus 로고    scopus 로고
    • Theoretical analysis of XL over small fields
    • ACISP 2004
    • B.-Y. Yang and J.-M. Chen, Theoretical Analysis of XL over Small Fields, ACISP 2004, LNCS 3108, pp. 277-288.
    • LNCS , vol.3108 , pp. 277-288
    • Yang, B.-Y.1    Chen, J.-M.2
  • 59
    • 33646811417 scopus 로고    scopus 로고
    • On asymptotic security estimates in XL and gröbner bases-related algebraic cryptanalysis
    • ICICS '04
    • B.-Y. Yang, J.-M. Chen, and N. Courtois, On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis, ICICS '04, LNCS 3269, pp. 401-413.
    • LNCS , vol.3269 , pp. 401-413
    • Yang, B.-Y.1    Chen, J.-M.2    Courtois, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.