메뉴 건너뛰기




Volumn 17, Issue 3-4, 2006, Pages 267-283

Polly two : A new algebraic polynomial-based public-key scheme

Author keywords

Combinatorially algebraic public key cryptoschemes; Elimination ideals; EnRoot; Linear Algebra attacks; Polly Cracker; Sparse polynomials; System of algebraic equations

Indexed keywords

COMBINATORIAL MATHEMATICS; COMPUTER CRIME; DATA PRIVACY; LINEAR ALGEBRA; POLYNOMIALS;

EID: 33746341181     PISSN: 09381279     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00200-006-0010-0     Document Type: Article
Times cited : (11)

References (12)
  • 1
    • 84937411146 scopus 로고    scopus 로고
    • Cryptanalysis of two sparse polynomial based public key cryptosystems
    • 1992. Lecture Notes in Comput Sci. Springer, Berlin Heidelberg New York
    • Bao, F., Deng, R., Geiselmann, W., Schnorr, C., Steinwandt, R., Wu, H.: Cryptanalysis of two sparse polynomial based public key cryptosystems. In: Public key cryptography 2000. Lecture Notes in Comput Sci pp. 153-164, 1992. Springer, Berlin Heidelberg New York (2001)
    • (2001) Public Key Cryptography 2000 , pp. 153-164
    • Bao, F.1    Deng, R.2    Geiselmann, W.3    Schnorr, C.4    Steinwandt, R.5    Wu, H.6
  • 2
    • 0003204425 scopus 로고
    • Gröbner bases. A computational approach to commutative algebra
    • cooperation with Heinz Kredel. Springer, Berlin Heidelberg New York
    • Becker, T., Weispfenning, V.: Gröbner bases. A computational approach to commutative algebra. In cooperation with Heinz Kredel. Graduate Texts in Mathematics, 141. Springer, Berlin Heidelberg New York (1993)
    • (1993) Graduate Texts in Mathematics , vol.141
    • Becker, T.1    Weispfenning, V.2
  • 3
    • 0000239575 scopus 로고
    • Why you cannot even hope to use Gröbner bases in public key cryptography: An open letter to a scientiest who failed and a challenge to those who have not yet failed
    • Barkee, B., Can, D.C., Ecks, J., Moriarty, T., Ree, R.F.: Why you cannot even hope to use Gröbner bases in public key cryptography: an open letter to a scientiest who failed and a challenge to those who have not yet failed. In: J Symbol Comput (18), 497-501 (1994)
    • (1994) J Symbol Comput , Issue.18 , pp. 497-501
    • Barkee, B.1    Can, D.C.2    Ecks, J.3    Moriarty, T.4    Ree, R.F.5
  • 4
    • 0003243860 scopus 로고
    • Commutative algebra. with a view toward algebraic geometry
    • Springer, Berlin Heidelberg New York
    • Eisenbud, D.: Commutative algebra. With a view toward algebraic geometry. Graduate Texts in Mathematics, 150. Springer, Berlin Heidelberg New York (1995)
    • (1995) Graduate Texts in Mathematics , vol.150
    • Eisenbud, D.1
  • 5
    • 33746377209 scopus 로고    scopus 로고
    • Attacking a polynomial based cryptosystem: Polly Cracker
    • Endsuleit, R., Geiselmann, W., Steinwandt, R.: Attacking a polynomial based cryptosystem: Polly Cracker. Int J Inform Secu 1(3), 143-148 (2002)
    • (2002) Int J Inform Secu , vol.1 , Issue.3 , pp. 143-148
    • Endsuleit, R.1    Geiselmann, W.2    Steinwandt, R.3
  • 6
    • 0001782990 scopus 로고
    • Combinatorial cryptosystems galore! Finite fields: Theory, applications, and algorithms (Las Vegas, NV, 1993)
    • Fellows, M., Koblitz, N.: Combinatorial cryptosystems galore! Finite fields: theory, applications, and algorithms (Las Vegas, NV, 1993). Contemp Math 168, 51-61 (1992)
    • (1992) Contemp Math , vol.168 , pp. 51-61
    • Fellows, M.1    Koblitz, N.2
  • 10
    • 0022476533 scopus 로고
    • A superexpoential lower bound for Gröner bases and Church-Rosser commutative Thue systems
    • Huỳnh, D.: A superexpoential lower bound for Gröner bases and Church-Rosser commutative Thue systems. Inform Control 68(1-3), 196-206 (1986)
    • (1986) Inform Control , vol.68 , Issue.1-3 , pp. 196-206
    • Huỳnh, D.1
  • 11
    • 0003347388 scopus 로고    scopus 로고
    • Algebraic aspects of cryptography
    • Springer, Berlin Heidelberg New York
    • Koblitz, N.: Algebraic aspects of cryptography. Algorithms and Comput Mathe, 3. Springer, Berlin Heidelberg New York (1998)
    • (1998) Algorithms and Comput Mathe , vol.3
    • Koblitz, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.