-
2
-
-
35048863447
-
Comparison between XL and gröbner basis algorithms
-
Advances in Cryptology - ASIACRYPT 2004
-
G. Ars, J.-C. Faugère, H. Imai, M. Kawazoe, and M. Sugita. Comparison Between XL and Gröbner Basis Algorithms. Advances in Cryptology - ASIACRYPT 2004, Lecture Notes in Computer Science, vol. 3329, pp. 338-353, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3329
, pp. 338-353
-
-
Ars, G.1
Faugère, J.-C.2
Imai, H.3
Kawazoe, M.4
Sugita, M.5
-
3
-
-
84862597693
-
Algebraic Immunities of functions over finite fields
-
Rouen
-
G. Ars, and J.-C. Faugère. Algebraic Immunities of functions over finite fields. Proceedings of BFCA'05, Rouen, 2005. Also available at http://eprint.iacr.org/2004/188.ps.
-
(2005)
Proceedings of BFCA'05
-
-
Ars, G.1
Faugère, J.-C.2
-
4
-
-
84860002294
-
Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems
-
15 pages
-
M. Bardet, J-C. Faugère, B. Salvy and B-Y. Yang. Asymptotic Behaviour of the Degree of Regularity of Semi-Regular Polynomial Systems. In MEGA 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry, 15 pages, 2005.
-
(2005)
MEGA 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry
-
-
Bardet, M.1
Faugère, J.-C.2
Salvy, B.3
Yang, B.-Y.4
-
6
-
-
38148998967
-
Cryptanalysis of patarin's 2-round public key system with S boxes (2R)
-
Advances in Cryptology - CRYPTO 2000, Springer-Verlag
-
E. Biham. Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R). Advances in Cryptology - CRYPTO 2000, Lecture Notes in Computer Science, vol. 1807, Springer-Verlag, pp. 408-416, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 408-416
-
-
Biham, E.1
-
7
-
-
0002803133
-
Gröbner bases: An algorithmic method in polynomial ideal theory
-
Reider ed. Bose
-
B. Buchberger. Gröbner Bases : an Algorithmic Method in Polynomial Ideal Theory. Recent trends in multidimensional systems theory. Reider ed. Bose, 1985.
-
(1985)
Recent Trends in Multidimensional Systems Theory
-
-
Buchberger, B.1
-
9
-
-
84941158065
-
Grey box implementation of block ciphers preserving the confidentiality of their design
-
Rouen
-
V. Carlier, H. Chabanne, and E. Dottax Grey Box Implementation of Block Ciphers Preserving the Confidentiality of their Design. Proceedings of BFCA'05, Rouen, 2005. Also available at http://eprint.iacr.org/2004/188.ps.
-
(2005)
Proceedings of BFCA'05
-
-
Carlier, V.1
Chabanne, H.2
Dottax, E.3
-
11
-
-
0003908675
-
Ideals, varieties, and algorithms: An introduction to computational algebraic geometry and commutative algebra
-
Springer-Verlag. New York
-
D. A. Cox, J.B. Little, and D. O'Shea. Ideals, Varieties, and Algorithms: an Introduction to Computational Algebraic Geometry and Commutative Algebra. Undergraduate Texts in Mathematics. Springer-Verlag. New York, 1992.
-
(1992)
Undergraduate Texts in Mathematics
-
-
Cox, D.A.1
Little, J.B.2
O'Shea, D.3
-
12
-
-
0038815245
-
-
Ph.D Thesis, TR 89-1023, Departement of Computer Science, Cornell University, Ithaca, NY, July
-
M. Dickerson. The functional Decomposition of Polynomials. Ph.D Thesis, TR 89-1023, Departement of Computer Science, Cornell University, Ithaca, NY, July 1989.
-
(1989)
The Functional Decomposition of Polynomials
-
-
Dickerson, M.1
-
14
-
-
25944479355
-
Efficient computation of zero-dimensional gröbner bases by change of ordering
-
J. C. Faugère, P. Gianni, D. Lazard, and T. Mora. Efficient Computation of Zero-Dimensional Gröbner Bases by Change of Ordering. Journal of Symbolic Computation, 16(4), pp. 329-344, 1993.
-
(1993)
Journal of Symbolic Computation
, vol.16
, Issue.4
, pp. 329-344
-
-
Faugère, J.C.1
Gianni, P.2
Lazard, D.3
Mora, T.4
-
15
-
-
0000655259
-
Polynomial decomposition algorithms
-
D. Kozen, and S. Landau. Polynomial decomposition algorithms. J. Symb. Comput. (7), pp 445-456, 1989.
-
(1989)
J. Symb. Comput.
, Issue.7
, pp. 445-456
-
-
Kozen, D.1
Landau, S.2
-
16
-
-
0342430954
-
Trapdoor one-way permutations and multivariate polynomials
-
Information and Communication Security, First International Conference (ICICS'97), Springer-Verlag
-
L. Goubin, and J. Patarin. Trapdoor One-way Permutations and Multivariate Polynomials. Information and Communication Security, First International Conference (ICICS'97), Lecture Notes in Computer Science vol. 1334, Springer-Verlag, pp. 356-368, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1334
, pp. 356-368
-
-
Goubin, L.1
Patarin, J.2
-
17
-
-
0010537086
-
Asymmetric cryptography with S-boxes
-
Information and Communication Security, First International Conference (ICICS'97), Springer-Verlag
-
L. Goubin, and J. Patarin. Asymmetric Cryptography with S-Boxes. Information and Communication Security, First International Conference (ICICS'97), Lecture Notes in Computer Science vol. 1334, Springer-Verlag, pp. 369-380, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1334
, pp. 369-380
-
-
Goubin, L.1
Patarin, J.2
-
19
-
-
0038105515
-
Multivariate polynomial decomposition
-
J. Gutierrez, R. Rubio, J. von zur Gathen. Multivariate Polynomial Decomposition. Algebra in Engineering, Communication and Computing, 14 (1), pp. 11-31.
-
Algebra in Engineering, Communication and Computing
, vol.14
, Issue.1
, pp. 11-31
-
-
Gutierrez, J.1
Rubio, R.2
Von Zur Gathen, J.3
-
20
-
-
33645591342
-
Algebraic methods for constructing asymmetric cryptosystems
-
Grenoble, France, Springer-Verlag
-
T. Matsumoto, and H. Imai. Algebraic Methods for Constructing Asymmetric Cryptosystems. Algebraic and Error-Correct ing Codes. Prod. Third Intern. Conf., Grenoble, France, Springer-Verlag, pp. 108-119, 1985.
-
(1985)
Algebraic and Error-correct Ing Codes. Prod. Third Intern. Conf.
, pp. 108-119
-
-
Matsumoto, T.1
Imai, H.2
-
21
-
-
85033537496
-
Public Quadratic Polynomial-tuples for efficient signature-verification and message-encryption
-
Advances in Cryptology - EU-ROCRYPT 1988, Springer-Verlag
-
T. Matsumoto, and H. Imai. Public Quadratic Polynomial-tuples for efficient signature-verification and message-encryption. Advances in Cryptology - EU-ROCRYPT 1988, Lecture Notes in Computer Science, vol. 330, Springer-Verlag, pp. 419-453, 1988.
-
(1988)
Lecture Notes in Computer Science
, vol.330
, pp. 419-453
-
-
Matsumoto, T.1
Imai, H.2
-
22
-
-
84957640013
-
Cryptanalysis of the matsumoto and imai public key scheme of Eurocrypt'88
-
Advances in Cryptology - CRYPTO 1995, Springer-Verlag
-
J. Patarin. Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88. Advances in Cryptology - CRYPTO 1995, Lecture Notes in Computer Science, Springer-Verlag, vol. 963, pp. 248-261, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.963
, pp. 248-261
-
-
Patarin, J.1
-
23
-
-
85025512580
-
Functional decomposition of polynomials: The tame case
-
J. von zur Gathen. Functional decomposition of polynomials: the tame case. J. Symb. Comput. (9), pp. 281-299, 1990.
-
(1990)
J. Symb. Comput.
, Issue.9
, pp. 281-299
-
-
Von Zur Gathen, J.1
-
24
-
-
84974611723
-
Functional decomposition of polynomials: The wild case
-
J. von zur Gathen. Functional decomposition of polynomials: the wild case. J. Symb. Comput. (10), pp. 437-452, 1990.
-
(1990)
J. Symb. Comput.
, Issue.10
, pp. 437-452
-
-
Von Zur Gathen, J.1
-
25
-
-
79959853957
-
Cryptanalysis of "2R" schemes
-
Advances in Cryptology - CRYPTO 1999, Springer-Verlag
-
D.F. Ye, K.Y. Lam, Z.D. Dai. Cryptanalysis of "2R" Schemes, Advances in Cryptology - CRYPTO 1999, Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, pp. 315-325, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 315-325
-
-
Ye, D.F.1
Lam, K.Y.2
Dai, Z.D.3
-
26
-
-
0037907072
-
Decomposing attacks on asymmetric cryptography based on mapping compositions
-
D.F. Ye, Z.D. Dai and K.Y. Lam. Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions, Journal of Cryptology (14), pp. 137-150, 2001.
-
(2001)
Journal of Cryptology
, Issue.14
, pp. 137-150
-
-
Ye, D.F.1
Dai, Z.D.2
Lam, K.Y.3
|