-
1
-
-
35248840147
-
Algebraic attacks on combiners with memory
-
Crypto 2003, Springer
-
F. Armknecht and M. Krause, "Algebraic attacks on combiners with memory," Crypto 2003, LNCS 2729, pp.162-175, Springer, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 162-175
-
-
Armknecht, F.1
Krause, M.2
-
2
-
-
32244432116
-
Comparison of XL and Gröbner basis algorithms over finite fields
-
INRIA Rocquencourt
-
G. Ars and J.-C. Faugère, "Comparison of XL and Gröbner basis algorithms over finite fields," Technical Report, INRIA Rocquencourt, 2004.
-
(2004)
Technical Report
-
-
Ars, G.1
Faugère, J.-C.2
-
3
-
-
35048863447
-
Comparison between XL algorithm and Gröbner basis algorithms
-
Asiacrypt 2004, Springer
-
G. Ars, J.-C. Faugère, H. Imai, M. Kawazoe, and M. Sugita, "Comparison between XL algorithm and Gröbner basis algorithms," Asiacrypt 2004, LNCS 3329, pp.338-352, Springer, 2004.
-
(2004)
LNCS
, vol.3329
, pp. 338-352
-
-
Ars, G.1
Faugère, J.-C.2
Imai, H.3
Kawazoe, M.4
Sugita, M.5
-
4
-
-
84980263493
-
A criterion for detecting unnecessary reductions in the construction of Gröbner basis
-
(1979), LNCS 72, Springer-Verlag
-
B. Buchberger, "A criterion for detecting unnecessary reductions in the construction of Gröbner basis," Proc. EUROSAM 79 (1979), LNCS 72, pp.3-21, Springer-Verlag, 1979.
-
(1979)
Proc. EUROSAM
, vol.79
, pp. 3-21
-
-
Buchberger, B.1
-
5
-
-
84937560136
-
The security of Hidden Field Equations (HFE)
-
Cryptographers' Track RSA Conference 2001, San Francisco, Springer
-
N. Courtois, "The security of Hidden Field Equations (HFE)," Cryptographers' Track RSA Conference 2001, San Francisco, LNCS 2020, pp.266-281, Springer, 2001.
-
(2001)
LNCS
, vol.2020
, pp. 266-281
-
-
Courtois, N.1
-
6
-
-
84958765510
-
Cryptanalysis of block ciphers with overdefined systems of equations
-
Asiacrypt 2002, Springer
-
N. Courtois and J. Pieprzyk, "Cryptanalysis of block ciphers with overdefined systems of equations," Asiacrypt 2002, LNCS 2501, pp.267-287, Springer, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 267-287
-
-
Courtois, N.1
Pieprzyk, J.2
-
7
-
-
35248828626
-
Higher order correlation attacks, XL algorithm and cryptanalysis of toyocrypt
-
ICISC 2002, Springer
-
N. Courtois, "Higher order correlation attacks, XL algorithm and cryptanalysis of toyocrypt," ICISC 2002, LNCS 2587, pp.182-199, Springer, 2002.
-
(2002)
LNCS
, vol.2587
, pp. 182-199
-
-
Courtois, N.1
-
8
-
-
35248820612
-
Algebraic attacks on stream ciphers with linear feedback
-
Eurocrypt 2003, Warsaw, Poland, Springer
-
N. Courtois and W. Meier, "Algebraic attacks on stream ciphers with linear feedback," Eurocrypt 2003, Warsaw, Poland, LNCS 2656, pp.345-359, Springer, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 345-359
-
-
Courtois, N.1
Meier, W.2
-
9
-
-
35248849880
-
Fast algebraic attacks on stream ciphers with linear feedback
-
Crypto 2003, Springer
-
N. Courtois, "Fast algebraic attacks on stream ciphers with linear feedback," Crypto 2003, LNCS 2729, pp.176-194, Springer, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 176-194
-
-
Courtois, N.1
-
10
-
-
0003868058
-
-
Springer-Verlag, New York
-
D. Cox, J. Little, and D. O'Shea, Using Algebraic Geometry, Springer-Verlag, New York, 1998.
-
(1998)
Using Algebraic Geometry
-
-
Cox, D.1
Little, J.2
O'Shea, D.3
-
12
-
-
0036045901
-
5)
-
ed. T. Mora, ACM Press, July
-
5)," Proc. ISSAC, ed. T. Mora, pp.75-83, ACM Press, July 2002.
-
(2002)
Proc. ISSAC
, pp. 75-83
-
-
Faugère, J.-C.1
-
13
-
-
35248840150
-
Algebraic cryptanalysis of Hidden Field Equation (HFE) cryptsystems using Gröbner bases
-
Crypto 2003, Springer
-
J.-C. Faugère and A. Joux, "Algebraic cryptanalysis of Hidden Field Equation (HFE) cryptsystems using Gröbner bases," Crypto 2003, LNCS 2729, pp.44-60, Springer, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 44-60
-
-
Faugère, J.-C.1
Joux, A.2
-
14
-
-
84957693117
-
Unbalanced oil and vinegar signature schemes
-
Eurocrypt 1999, Springer-Verlag
-
A. Kipnis, J. Patarin, and L. Goubin, "Unbalanced oil and vinegar signature schemes," Eurocrypt 1999, LNCS 1952, pp.206-222, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1952
, pp. 206-222
-
-
Kipnis, A.1
Patarin, J.2
Goubin, L.3
-
15
-
-
84957060922
-
Cryptanalysis of the HFE public key cryptosystem
-
Proc. Crypto'99, Springer-Verlag
-
A. Kipnis and A. Shamir, "Cryptanalysis of the HFE public key cryptosystem," Proc. Crypto'99, LNCS 1666, pp. 19-30, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 19-30
-
-
Kipnis, A.1
Shamir, A.2
-
16
-
-
85034440461
-
Gröbner bases, Gaussian elimination and resolution of systems of algebraic equations
-
Computer algebra, Springer, London
-
D. Lazard, "Gröbner bases, Gaussian elimination and resolution of systems of algebraic equations," Computer algebra, LNCS 162, pp.146-156, Springer, London, 1983.
-
(1983)
LNCS
, vol.162
, pp. 146-156
-
-
Lazard, D.1
-
17
-
-
84957640013
-
Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt'88
-
Crypto'95, Springer
-
J. Patarin, "Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt'88," Crypto'95, LNCS 963, pp.248-261, Springer, 1995.
-
(1995)
LNCS
, vol.963
, pp. 248-261
-
-
Patarin, J.1
-
18
-
-
77649327985
-
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
-
Eurocrypt 2000, Springer
-
A. Shamir, J. Patarin, N. Courtois, and A. Klimov, "Efficient algorithms for solving overdefined systems of multivariate polynomial equations," Eurocrypt 2000, LNCS 1807, pp.392-407, Springer, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 392-407
-
-
Shamir, A.1
Patarin, J.2
Courtois, N.3
Klimov, A.4
-
21
-
-
33646781847
-
Relation between XL algorithm and Gröbner bases algorithms
-
M. Sugita, M. Kawazoe, and H. Imai, "Relation between XL algorithm and Gröbner bases algorithms," Cryptology ePrint Archive, Report 2004/112, 2004, http://eprint.iacr.org/
-
(2004)
Cryptology EPrint Archive, Report
, vol.2004
, Issue.112
-
-
Sugita, M.1
Kawazoe, M.2
Imai, H.3
|