메뉴 건너뛰기




Volumn 4117 LNCS, Issue , 2006, Pages 357-372

Cryptanalysis of 2R- schemes

Author keywords

Cryptanalysis; F5 algorithm; Functional Decomposition Problem (FDP); Gr bner bases

Indexed keywords

ALGORITHMS; POLYNOMIALS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 33749567193     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11818175_21     Document Type: Conference Paper
Times cited : (22)

References (26)
  • 2
    • 35048863447 scopus 로고    scopus 로고
    • Comparison between XL and gröbner basis algorithms
    • Advances in Cryptology - ASIACRYPT 2004
    • G. Ars, J.-C. Faugère, H. Imai, M. Kawazoe, and M. Sugita. Comparison Between XL and Gröbner Basis Algorithms. Advances in Cryptology - ASIACRYPT 2004, Lecture Notes in Computer Science, vol. 3329, pp. 338-353, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3329 , pp. 338-353
    • Ars, G.1    Faugère, J.-C.2    Imai, H.3    Kawazoe, M.4    Sugita, M.5
  • 3
    • 84862597693 scopus 로고    scopus 로고
    • Algebraic Immunities of functions over finite fields
    • Rouen
    • G. Ars, and J.-C. Faugère. Algebraic Immunities of functions over finite fields. Proceedings of BFCA'05, Rouen, 2005. Also available at http://eprint.iacr.org/2004/188.ps.
    • (2005) Proceedings of BFCA'05
    • Ars, G.1    Faugère, J.-C.2
  • 6
    • 38148998967 scopus 로고    scopus 로고
    • Cryptanalysis of patarin's 2-round public key system with S boxes (2R)
    • Advances in Cryptology - CRYPTO 2000, Springer-Verlag
    • E. Biham. Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R). Advances in Cryptology - CRYPTO 2000, Lecture Notes in Computer Science, vol. 1807, Springer-Verlag, pp. 408-416, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 408-416
    • Biham, E.1
  • 7
    • 0002803133 scopus 로고
    • Gröbner bases: An algorithmic method in polynomial ideal theory
    • Reider ed. Bose
    • B. Buchberger. Gröbner Bases : an Algorithmic Method in Polynomial Ideal Theory. Recent trends in multidimensional systems theory. Reider ed. Bose, 1985.
    • (1985) Recent Trends in Multidimensional Systems Theory
    • Buchberger, B.1
  • 9
    • 84941158065 scopus 로고    scopus 로고
    • Grey box implementation of block ciphers preserving the confidentiality of their design
    • Rouen
    • V. Carlier, H. Chabanne, and E. Dottax Grey Box Implementation of Block Ciphers Preserving the Confidentiality of their Design. Proceedings of BFCA'05, Rouen, 2005. Also available at http://eprint.iacr.org/2004/188.ps.
    • (2005) Proceedings of BFCA'05
    • Carlier, V.1    Chabanne, H.2    Dottax, E.3
  • 11
    • 0003908675 scopus 로고
    • Ideals, varieties, and algorithms: An introduction to computational algebraic geometry and commutative algebra
    • Springer-Verlag. New York
    • D. A. Cox, J.B. Little, and D. O'Shea. Ideals, Varieties, and Algorithms: an Introduction to Computational Algebraic Geometry and Commutative Algebra. Undergraduate Texts in Mathematics. Springer-Verlag. New York, 1992.
    • (1992) Undergraduate Texts in Mathematics
    • Cox, D.A.1    Little, J.B.2    O'Shea, D.3
  • 12
    • 0038815245 scopus 로고
    • Ph.D Thesis, TR 89-1023, Departement of Computer Science, Cornell University, Ithaca, NY, July
    • M. Dickerson. The functional Decomposition of Polynomials. Ph.D Thesis, TR 89-1023, Departement of Computer Science, Cornell University, Ithaca, NY, July 1989.
    • (1989) The Functional Decomposition of Polynomials
    • Dickerson, M.1
  • 14
    • 25944479355 scopus 로고
    • Efficient computation of zero-dimensional gröbner bases by change of ordering
    • J. C. Faugère, P. Gianni, D. Lazard, and T. Mora. Efficient Computation of Zero-Dimensional Gröbner Bases by Change of Ordering. Journal of Symbolic Computation, 16(4), pp. 329-344, 1993.
    • (1993) Journal of Symbolic Computation , vol.16 , Issue.4 , pp. 329-344
    • Faugère, J.C.1    Gianni, P.2    Lazard, D.3    Mora, T.4
  • 15
    • 0000655259 scopus 로고
    • Polynomial decomposition algorithms
    • D. Kozen, and S. Landau. Polynomial decomposition algorithms. J. Symb. Comput. (7), pp 445-456, 1989.
    • (1989) J. Symb. Comput. , Issue.7 , pp. 445-456
    • Kozen, D.1    Landau, S.2
  • 16
    • 0342430954 scopus 로고    scopus 로고
    • Trapdoor one-way permutations and multivariate polynomials
    • Information and Communication Security, First International Conference (ICICS'97), Springer-Verlag
    • L. Goubin, and J. Patarin. Trapdoor One-way Permutations and Multivariate Polynomials. Information and Communication Security, First International Conference (ICICS'97), Lecture Notes in Computer Science vol. 1334, Springer-Verlag, pp. 356-368, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1334 , pp. 356-368
    • Goubin, L.1    Patarin, J.2
  • 17
    • 0010537086 scopus 로고    scopus 로고
    • Asymmetric cryptography with S-boxes
    • Information and Communication Security, First International Conference (ICICS'97), Springer-Verlag
    • L. Goubin, and J. Patarin. Asymmetric Cryptography with S-Boxes. Information and Communication Security, First International Conference (ICICS'97), Lecture Notes in Computer Science vol. 1334, Springer-Verlag, pp. 369-380, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1334 , pp. 369-380
    • Goubin, L.1    Patarin, J.2
  • 21
    • 85033537496 scopus 로고
    • Public Quadratic Polynomial-tuples for efficient signature-verification and message-encryption
    • Advances in Cryptology - EU-ROCRYPT 1988, Springer-Verlag
    • T. Matsumoto, and H. Imai. Public Quadratic Polynomial-tuples for efficient signature-verification and message-encryption. Advances in Cryptology - EU-ROCRYPT 1988, Lecture Notes in Computer Science, vol. 330, Springer-Verlag, pp. 419-453, 1988.
    • (1988) Lecture Notes in Computer Science , vol.330 , pp. 419-453
    • Matsumoto, T.1    Imai, H.2
  • 22
    • 84957640013 scopus 로고
    • Cryptanalysis of the matsumoto and imai public key scheme of Eurocrypt'88
    • Advances in Cryptology - CRYPTO 1995, Springer-Verlag
    • J. Patarin. Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88. Advances in Cryptology - CRYPTO 1995, Lecture Notes in Computer Science, Springer-Verlag, vol. 963, pp. 248-261, 1995.
    • (1995) Lecture Notes in Computer Science , vol.963 , pp. 248-261
    • Patarin, J.1
  • 23
    • 85025512580 scopus 로고
    • Functional decomposition of polynomials: The tame case
    • J. von zur Gathen. Functional decomposition of polynomials: the tame case. J. Symb. Comput. (9), pp. 281-299, 1990.
    • (1990) J. Symb. Comput. , Issue.9 , pp. 281-299
    • Von Zur Gathen, J.1
  • 24
    • 84974611723 scopus 로고
    • Functional decomposition of polynomials: The wild case
    • J. von zur Gathen. Functional decomposition of polynomials: the wild case. J. Symb. Comput. (10), pp. 437-452, 1990.
    • (1990) J. Symb. Comput. , Issue.10 , pp. 437-452
    • Von Zur Gathen, J.1
  • 25
    • 79959853957 scopus 로고    scopus 로고
    • Cryptanalysis of "2R" schemes
    • Advances in Cryptology - CRYPTO 1999, Springer-Verlag
    • D.F. Ye, K.Y. Lam, Z.D. Dai. Cryptanalysis of "2R" Schemes, Advances in Cryptology - CRYPTO 1999, Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, pp. 315-325, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 315-325
    • Ye, D.F.1    Lam, K.Y.2    Dai, Z.D.3
  • 26
    • 0037907072 scopus 로고    scopus 로고
    • Decomposing attacks on asymmetric cryptography based on mapping compositions
    • D.F. Ye, Z.D. Dai and K.Y. Lam. Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions, Journal of Cryptology (14), pp. 137-150, 2001.
    • (2001) Journal of Cryptology , Issue.14 , pp. 137-150
    • Ye, D.F.1    Dai, Z.D.2    Lam, K.Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.