-
2
-
-
35048863447
-
Comparison between XL and Gröbner basis algorithms
-
Advances in Cryptology - ASIACRYPT 2004
-
G. Ars, J.-C. Faugère, H. Imai, M. Kawazoe, and M. Sugita. Comparison Between XL and Gröbner Basis Algorithms. Advances in Cryptology - ASIACRYPT 2004, Lecture Notes in Computer Science, vol. 3329, pp. 338-353, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3329
, pp. 338-353
-
-
Ars, G.1
Faugère, J.-C.2
Imai, H.3
Kawazoe, M.4
Sugita, M.5
-
3
-
-
84860002294
-
Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems
-
15 pages
-
M. Bardet, J-C. Faugère, B. Salvy and B-Y. Yang. Asymptotic Behaviour of the Degree of Regularity of Semi-Regular Polynomial Systems. In MEGA 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry, 15 pages, 2005.
-
(2005)
MEGA 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry
-
-
Bardet, M.1
Faugère, J.-C.2
Salvy, B.3
Yang, B.-Y.4
-
5
-
-
0344196672
-
A traceable block cipher
-
Advances in Cryptology - ASIACRYPT 2003, Springer-Verlag
-
O. Billet, and H. Gilbert. A Traceable Block Cipher. Advances in Cryptology - ASIACRYPT 2003, Lecture Notes in Computer Science, vol. 2894, Springer-Verlag, pp. 331-346, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2894
, pp. 331-346
-
-
Billet, O.1
Gilbert, H.2
-
6
-
-
35248818760
-
A toolbox for cryptanalysis: Linear and affine equivalence algorithms
-
Advances in Cryptology - EUROCRYPT 2003, Springer-Verlag
-
A. Biryukov, C. De Cannière, A. Braeken, and B. Preneel. A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms. Advances in Cryptology - EUROCRYPT 2003, Lecture Notes in Computer Science, vol. 2656, Springer-Verlag, pp. 33-50, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 33-50
-
-
Biryukov, A.1
De Cannière, C.2
Braeken, A.3
Preneel, B.4
-
7
-
-
0023646410
-
Does co-NP have short interactive proofs?
-
R. B. Boppana, J. Hastad, and S. Zachos. Does co-NP Have Short Interactive Proofs? Information Processing Letters, 25(2), pp. 127-132, 1987.
-
(1987)
Information Processing Letters
, vol.25
, Issue.2
, pp. 127-132
-
-
Boppana, R.B.1
Hastad, J.2
Zachos, S.3
-
8
-
-
0002803133
-
Gröbner bases: An algorithmic method in polynomial ideal theory
-
Reider ed. Bose
-
B. Buchberger. Gröbner Bases: an Algorithmic Method in Polynomial Ideal Theory. Recent trends in multidimensional systems theory. Reider ed. Bose, 1985.
-
(1985)
Recent Trends in Multidimensional Systems Theory
-
-
Buchberger, B.1
-
10
-
-
33645586143
-
-
Ph.D. Thesis, Paris
-
N. Courtois. La sécurité des primitives cryptographiques basées sur des problèmes algébriques multivariables: MQ, IP, MinRank, HFE. Ph.D. Thesis, Paris, 2001.
-
(2001)
La Sécurité des Primitives Cryptographiques Basées sur des Problèmes Algébriques Multivariables: MQ, IP, MinRank, HFE
-
-
Courtois, N.1
-
11
-
-
84957654670
-
Improved algorithms for isomorphism of polynomials
-
Advances in Cryptology - EUROCRYPT 1998, Springer-Verlag
-
N. Courtois, L. Goubin, and J. Patarin. Improved Algorithms for Isomorphism of Polynomials. Advances in Cryptology - EUROCRYPT 1998, Lecture Notes in Computer Science, vol. 1403, Springer-Verlag, pp. 84-200, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1403
, pp. 84-200
-
-
Courtois, N.1
Goubin, L.2
Patarin, J.3
-
14
-
-
77649327985
-
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
-
Advances in Cryptology - EUROCRYPT 2000, Springer-Verlag
-
N. Courtois, A. Klimov, J. Patarin, and A. Shamir. Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. Advances in Cryptology - EUROCRYPT 2000, Lecture Notes in Computer Science, vol. 1807, Springer-Verlag, pp. 392-407, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 392-407
-
-
Courtois, N.1
Klimov, A.2
Patarin, J.3
Shamir, A.4
-
15
-
-
0003908675
-
Ideals, varieties, and algorithms: An introduction to computational algebraic geometry and commutative algebra
-
Springer-Verlag. New York
-
D. A. Cox, J.B. Little and, D. O'Shea. Ideals, Varieties, and Algorithms: an Introduction to Computational Algebraic Geometry and Commutative Algebra. Undergraduate Texts in Mathematics. Springer-Verlag. New York, 1992.
-
(1992)
Undergraduate Texts in Mathematics
-
-
Cox, D.A.1
Little, J.B.2
O'Shea, D.3
-
18
-
-
35248840150
-
Algebraic cryptanalysis of Hidden Field Equation (HFE) cryptosystems using Gröbner bases
-
Advances in Cryptology - CRYPTO 2003, Springer-Verlag
-
J.-C. Faugère, and A. Joux. Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems using Gröbner bases. Advances in Cryptology - CRYPTO 2003, Lecture Notes in Computer Science, vol. 2729, Springer-Verlag, pp. 44-60, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 44-60
-
-
Faugère, J.-C.1
Joux, A.2
-
19
-
-
25944479355
-
Efficient computation of zero-dimensional Gröbner bases by change of ordering
-
J. C. Faugère, P. Gianni, D. Lazard, and T. Mora. Efficient Computation of Zero-Dimensional Gröbner Bases by Change of Ordering. Journal of Symbolic Computation, 16(4), pp. 329-344, 1993.
-
(1993)
Journal of Symbolic Computation
, vol.16
, Issue.4
, pp. 329-344
-
-
Faugère, J.C.1
Gianni, P.2
Lazard, D.3
Mora, T.4
-
21
-
-
0008690083
-
The graph isomorphism problem
-
University of Alberta
-
S. Fortin. The Graph Isomorphism problem. Technical Report 96-20, University of Alberta, 1996.
-
(1996)
Technical Report
, vol.96
, Issue.20
-
-
Fortin, S.1
-
23
-
-
84946835010
-
Attacking the affine parts of SFLASH
-
Springer-Verlag
-
W. Geiselmann, R. Steinwandt, and T. Beth. Attacking the Affine Parts of SFLASH. Cryptography and Coding, 8th IMA International Conference, vol. 2260, Springer-Verlag, pp. 355-359, 2001.
-
(2001)
Cryptography and Coding, 8th IMA International Conference
, vol.2260
, pp. 355-359
-
-
Geiselmann, W.1
Steinwandt, R.2
Beth, T.3
-
24
-
-
0004569294
-
Group-theoretic algorithms and Graph Isomorphism
-
Springer-Verlag
-
M. Hoffman. Group-theoretic algorithms and Graph Isomorphism. Lecture Notes in Computer Science, vol. 136, Springer-Verlag, 1982.
-
(1982)
Lecture Notes in Computer Science
, vol.136
-
-
Hoffman, M.1
-
25
-
-
84941150389
-
-
http://magma.maths.usyd.edu.au/magma/
-
-
-
-
26
-
-
85033537496
-
Public Quadratic Polynomial-tuples for efficient signature-verification and message-encryption
-
Advances in Cryptology - EUROCRYPT 1988, Springer-Verlag
-
T. Matsumoto, and H. Imai. Public Quadratic Polynomial-tuples for efficient signature-verification and message-encryption. Advances in Cryptology - EUROCRYPT 1988, Lecture Notes in Computer Science, vol. 330, Springer-Verlag, pp. 419-453, 1988.
-
(1988)
Lecture Notes in Computer Science
, vol.330
, pp. 419-453
-
-
Matsumoto, T.1
Imai, H.2
-
27
-
-
84941157649
-
-
https://www.cosic.esat.kuleuven.be/nessie/deliverables/decision-final. pdf.
-
-
-
-
28
-
-
84947932132
-
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two new families of asymmetric algorithms
-
Advances in Cryptology - EUROCRYPT 1996, Springer-Verlag
-
J. Patarin. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of Asymmetric Algorithms. Advances in Cryptology - EUROCRYPT 1996, Lecture Notes in Computer Science, vol. 1070, Springer-Verlag, pp. 33-48, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1070
, pp. 33-48
-
-
Patarin, J.1
-
30
-
-
84957640013
-
Cryptanalysis of the matsumoto and imai public key scheme of Eurocrypt '88
-
Advances in Cryptology - CRYPTO 1995, Springer-Verlag
-
J. Patarin. Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt '88. Advances in Cryptology - CRYPTO 1995, Lecture Notes in Computer Science, Springer-Verlag, vol. 963, pp. 248-261, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.963
, pp. 248-261
-
-
Patarin, J.1
|