-
1
-
-
3042547883
-
A fast and secure implementation of SPLASH
-
PKC 2003
-
M. Akkar, N. Courtois, R. Duteuil, and L. Goubin, A Fast and Secure Implementation of SPLASH, PKC 2003, LNCS 2567, pp. 267-278.
-
LNCS
, vol.2567
, pp. 267-278
-
-
Akkar, M.1
Courtois, N.2
Duteuil, R.3
Goubin, L.4
-
2
-
-
84861246468
-
Comparison of XL and gröbner bases algorithms over finite fields
-
ASIACRYPT'04
-
G. Ars and J.-C. Faugère, H. Imai, M. Kawazoe, and M. Sugita, Comparison of XL and Gröbner Bases Algorithms over Finite Fields, ASIACRYPT'04, LNCS 3329, pp. 338-353.
-
LNCS
, vol.3329
, pp. 338-353
-
-
Ars, G.1
Faugère, J.-C.2
Imai, H.3
Kawazoe, M.4
Sugita, M.5
-
4
-
-
33746062308
-
Complexity of gröbner basis computations for regular overdetermined systems
-
INRIA Rapport de Recherche No. 5049; a slightly modified preprint is accepted by the
-
M. Bardet, J.-C. Faugère, and B. Salvy, Complexity of Gröbner Basis Computations for Regular Overdetermined Systems, INRIA Rapport de Recherche No. 5049; a slightly modified preprint is accepted by the International Conference on Polynomial System Solving.
-
International Conference on Polynomial System Solving
-
-
Bardet, M.1
Faugère, J.-C.2
Salvy, B.3
-
6
-
-
0000239575
-
Why you cannot even hope to use gröbner bases in public-key cryptography
-
B. Barkee et al, Why You Cannot Even Hope to Use Gröbner Bases in Public-Key Cryptography, J. Symbolic Computations, 18 (1994), pp. 497-501.
-
(1994)
J. Symbolic Computations
, vol.18
, pp. 497-501
-
-
Barkee, B.1
-
7
-
-
84968505384
-
Triangular factorizations and inversion by fast matrix multiplication
-
J. R. Bunch and J. E. Hopcroft, Triangular Factorizations and Inversion by Fast Matrix Multiplication, Math. Computations, 24 (1974), pp. 231-236.
-
(1974)
Math. Computations
, vol.24
, pp. 231-236
-
-
Bunch, J.R.1
Hopcroft, J.E.2
-
9
-
-
24944516448
-
-
preprint, stated to be superseded by a yet unpublished version
-
D. Bernstein, Matrix Inversion Made Difficult, preprint, stated to be superseded by a yet unpublished version, available at http://cr.yp.to.
-
Matrix Inversion Made Difficult
-
-
Bernstein, D.1
-
10
-
-
85027644628
-
Some new effectivity bounds in computational geometry
-
AAECC-6
-
L. Caniglia, A. Galligo, and J. Heintz, Some New Effectivity Bounds in Computational Geometry, AAECC-6, 1988, LNCS 357, pp. 131-151.
-
(1988)
LNCS
, vol.357
, pp. 131-151
-
-
Caniglia, L.1
Galligo, A.2
Heintz, J.3
-
11
-
-
0001804016
-
Equations for the protective closure and effective nullstellensatz
-
L. Caniglia, A. Galligo, and J. Heintz, Equations for the Protective Closure and Effective Nullstellensatz, Discrete Applied Mathematics, 33 (1991), pp. 11-23.
-
(1991)
Discrete Applied Mathematics
, vol.33
, pp. 11-23
-
-
Caniglia, L.1
Galligo, A.2
Heintz, J.3
-
13
-
-
24944463551
-
-
private communication
-
D. Coppersmith, private communication.
-
-
-
Coppersmith, D.1
-
14
-
-
84937560136
-
The security of Hidden Field Equations (HFE)
-
CT-RSA 2001
-
N. Courtois, The Security of Hidden Field Equations (HFE), CT-RSA 2001, LNCS 2020, pp. 266-281.
-
LNCS
, vol.2020
, pp. 266-281
-
-
Courtois, N.1
-
15
-
-
35248828626
-
Higher-order correlation attacks, XL algorithm and cryptanalysis of toyocrypt
-
ICISC '02
-
N. Courtois, Higher-Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt, ICISC '02, LNCS 2587, pp. 182-199.
-
LNCS
, vol.2587
, pp. 182-199
-
-
Courtois, N.1
-
16
-
-
35248849880
-
Fast algebraic attacks on stream ciphers with linear feedback
-
CRYPTO'03
-
N. Courtois, Fast Algebraic Attacks on Stream Ciphers with Linear Feedback, CRYPTO'03, LNCS 2729, pp. 177-194.
-
LNCS
, vol.2729
, pp. 177-194
-
-
Courtois, N.1
-
17
-
-
84943322182
-
v2
-
PKC '04
-
v2, PKC '04, LNCS 2947, pp. 201-217.
-
LNCS
, vol.2947
, pp. 201-217
-
-
Courtois, N.1
-
18
-
-
24944475874
-
-
private communication
-
N. Courtois, private communication.
-
-
-
Courtois, N.1
-
20
-
-
77649327985
-
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
-
EUROCRYPT 2000
-
N. Courtois, A. Klimov, J. Patarin, and A. Shamir, Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations, EUROCRYPT 2000, LNCS 1807, pp. 392-407.
-
LNCS
, vol.1807
, pp. 392-407
-
-
Courtois, N.1
Klimov, A.2
Patarin, J.3
Shamir, A.4
-
21
-
-
84958765510
-
Cryptanalysis of block ciphers with overdefined systems of equations
-
ASIACRYPT 2002
-
N. Courtois and J. Pieprzyk, Cryptanalysis of Block Ciphers with Overdefined Systems of Equations, ASIACRYPT 2002, LNCS 2501, pp. 267-287.
-
LNCS
, vol.2501
, pp. 267-287
-
-
Courtois, N.1
Pieprzyk, J.2
-
22
-
-
35248834096
-
About the XL algorithm over GF(2)
-
CT-RSA 2003
-
N. Courtois and J. Patarin, About the XL Algorithm over GF(2), CT-RSA 2003, LNCS 2612, pp. 141-157.
-
LNCS
, vol.2612
, pp. 141-157
-
-
Courtois, N.1
Patarin, J.2
-
24
-
-
24944450905
-
The XL-algorithm and a conjecture from commutative algebra
-
ASIACRYPT'04, and private communication
-
C. Diem, The XL-algorithm and a Conjecture from Commutative Algebra, ASIACRYPT'04, LNCS 3329, pp. 323-337 and private communication.
-
LNCS
, vol.3329
, pp. 323-337
-
-
Diem, C.1
-
25
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman, New Directions in Cryptography, IEEE Trans. Info. Theory, vol. IT-22, 6 (1972), pp. 644-654.
-
(1972)
IEEE Trans. Info. Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
28
-
-
0030702656
-
On randomized lanczos algorithms
-
ACM Press
-
W. Eberly and E. Kaltofen, On Randomized Lanczos Algorithms, Proc. ISSAC '97, pp. 176-183, ACM Press 1997.
-
(1997)
Proc. ISSAC '97
, pp. 176-183
-
-
Eberly, W.1
Kaltofen, E.2
-
29
-
-
0033143274
-
A new efficient algorithm for computing gröbner bases (F4)
-
J.-C. Faugére, A New Efficient Algorithm for Computing Gröbner Bases (F4), Journal of Pure and Applied Algebra, 139 (1999), pp. 61-88.
-
(1999)
Journal of Pure and Applied Algebra
, vol.139
, pp. 61-88
-
-
Faugére, J.-C.1
-
30
-
-
0036045901
-
A new efficient algorithm for computing gröbner bases without reduction to zero (F5)
-
ACM Press
-
J.-C. Faugère, A New Efficient Algorithm for Computing Gröbner Bases without Reduction to Zero (F5), Proceedings of ISSAC 2002, pp. 75-83, ACM Press 2002.
-
(2002)
Proceedings of ISSAC 2002
, pp. 75-83
-
-
Faugère, J.-C.1
-
31
-
-
35248840150
-
Algebraic cryptanalysis of Hidden Field Equations (HFE) cryptosystems using gröbner bases
-
CRYPTO 2003
-
J.-C. Faugère and A. Joux, Algebraic Cryptanalysis of Hidden Field Equations (HFE) Cryptosystems Using Gröbner Bases, CRYPTO 2003, LNCS 2729, pp. 44-60.
-
LNCS
, vol.2729
, pp. 44-60
-
-
Faugère, J.-C.1
Joux, A.2
-
32
-
-
0001511869
-
An inequality for hubert series of graded algebras
-
R. Fröberg, An Inequality for Hubert Series of Graded Algebras, Math. Scand. 56(1985) pp. 117-144.
-
(1985)
Math. Scand.
, vol.56
, pp. 117-144
-
-
Fröberg, R.1
-
35
-
-
0040095805
-
Asymptotic estimates of elementary probability distributions
-
H.-K. Hwang, Asymptotic estimates of elementary probability distributions, Studies in Applied Mathematics, 99:4 (1997), pp. 393-417.
-
(1997)
Studies in Applied Mathematics
, vol.99
, Issue.4
, pp. 393-417
-
-
Hwang, H.-K.1
-
37
-
-
84957060922
-
Cryptanalysis of the HFE public key cryptosystem by relinearization
-
CRYPTO'99
-
A. Kipnis and A. Shamir, Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization, CRYPTO'99, LNCS 1666, pp. 19-30.
-
LNCS
, vol.1666
, pp. 19-30
-
-
Kipnis, A.1
Shamir, A.2
-
38
-
-
84988216913
-
Solving large sparse linear systems over finite fields
-
CRYPTO'90
-
B. LaMacchia and A. Odlyzko, Solving Large Sparse Linear Systems over Finite Fields, CRYPTO'90, LNCS 537, pp. 109-133.
-
LNCS
, vol.537
, pp. 109-133
-
-
LaMacchia, B.1
Odlyzko, A.2
-
40
-
-
85034440461
-
Gröbner bases, Gaussian elimination and resolution of systems of algebraic equations
-
EUROCAL '83
-
D. Lazard, Gröbner Bases, Gaussian Elimination and Resolution of Systems of Algebraic Equations, EUROCAL '83, LNCS 162, pp. 146-156.
-
LNCS
, vol.162
, pp. 146-156
-
-
Lazard, D.1
-
41
-
-
24944587417
-
Veni, divisi, vici
-
Appearing in the "Computer Science Sampler" column of the, May
-
C. McGeoch, "Veni, Divisi, Vici", Appearing in the "Computer Science Sampler" column of the Amer. Math. Monthly, May 1995.
-
(1995)
Amer. Math. Monthly
-
-
McGeoch, C.1
-
42
-
-
84861248699
-
-
The MAGMA project, University of Sydney, see http://magma.maths.usyd.edu. au/users/allan/gb
-
-
-
-
43
-
-
85033537496
-
Public quadratic polynomial-tuples for efficient signature-verification and message-encryption
-
EUROCRYPT'88
-
T. Matsumoto and H. Imai, Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption, EUROCRYPT'88, LNCS 330, pp. 419-453.
-
LNCS
, vol.330
, pp. 419-453
-
-
Matsumoto, T.1
Imai, H.2
-
45
-
-
84937413721
-
Essential algebraic structures within the AES
-
CRYPTO 2002
-
S. Murphy and M. Robshaw, Essential Algebraic Structures Within the AES, CRYPTO 2002, LNCS 2442, pp. 1-16.
-
LNCS
, vol.2442
, pp. 1-16
-
-
Murphy, S.1
Robshaw, M.2
-
48
-
-
84947932132
-
Hidden Fields Equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms
-
EUROCRYPT'96
-
J. Patarin, Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms, EUROCRYPT'96, LNCS 1070, pp. 33-48.
-
LNCS
, vol.1070
, pp. 33-48
-
-
Patarin, J.1
-
49
-
-
84947768941
-
-+* and HM: Variations around two schemes of T. Matsumoto and H. Imai
-
ASIACRYPT'98
-
-+* and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai, ASIACRYPT'98, LNCS 1514, pp. 35-49.
-
LNCS
, vol.1514
, pp. 35-49
-
-
Patarin, J.1
Goubin, L.2
Courtois, N.3
-
50
-
-
84937576636
-
QUARTZ, 128-bit long digital signatures
-
CT-RSA 2001
-
J. Patarin, N. Courtois, and L. Goubin, QUARTZ, 128-Bit Long Digital Signatures, CT-RSA 2001, LNCS 2020, pp. 282-297. Update at http://www. cryptonessie.org
-
LNCS
, vol.2020
, pp. 282-297
-
-
Patarin, J.1
Courtois, N.2
Goubin, L.3
-
52
-
-
0003652674
-
-
second printing 1996; vol. 2 in 1999. Both published by Cambridge University Press, Cambridge
-
R. Stanley, Enumerative Combinatorics, vol. 1, second printing 1996; vol. 2 in 1999. Both published by Cambridge University Press, Cambridge.
-
Enumerative Combinatorics
, vol.1
-
-
Stanley, R.1
-
53
-
-
34250487811
-
Gaussian elimination is not optimal
-
V. Strassen, Gaussian Elimination is not Optimal, Numer. Math. 13 (1969) pp. 354-356.
-
(1969)
Numer. Math.
, vol.13
, pp. 354-356
-
-
Strassen, V.1
-
56
-
-
0022583143
-
Solving sparse linear equations over finite fields
-
D. Wiedemann, Solving Sparse Linear Equations over Finite Fields, IEEE Transaction on Information Theory, v. IT-32 (1976), no. 1, pp. 54-62.
-
(1976)
IEEE Transaction on Information Theory
, vol.IT-32
, Issue.1
, pp. 54-62
-
-
Wiedemann, D.1
-
58
-
-
33646770907
-
Theoretical analysis of XL over small fields
-
ACISP 2004
-
B.-Y. Yang and J.-M. Chen, Theoretical Analysis of XL over Small Fields, ACISP 2004, LNCS 3108, pp. 277-288.
-
LNCS
, vol.3108
, pp. 277-288
-
-
Yang, B.-Y.1
Chen, J.-M.2
-
59
-
-
33646811417
-
On asymptotic security estimates in XL and gröbner bases-related algebraic cryptanalysis
-
ICICS '04
-
B.-Y. Yang, J.-M. Chen, and N. Courtois, On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis, ICICS '04, LNCS 3269, pp. 401-413.
-
LNCS
, vol.3269
, pp. 401-413
-
-
Yang, B.-Y.1
Chen, J.-M.2
Courtois, N.3
|