-
1
-
-
35248840147
-
Algebraic Attacks on Combiners with Memory
-
Crypto 2003, Springer
-
F. Armknecht, M. Krause, "Algebraic Attacks on Combiners with Memory," Crypto 2003, LNCS 2729, pp. 162-176, Springer.
-
LNCS
, vol.2729
, pp. 162-176
-
-
Armknecht, F.1
Krause, M.2
-
5
-
-
84937560136
-
The security of Hidden Field Equations (HFE)
-
Cryptographers' Track RSA Conference 2001, San Francisco 8-12 April Springer
-
N. Courtois, "The security of Hidden Field Equations (HFE)", Cryptographers' Track RSA Conference 2001, San Francisco 8-12 April 2001, LNCS 2020, Springer, pp. 266-281.
-
(2001)
LNCS
, vol.2020
, pp. 266-281
-
-
Courtois, N.1
-
6
-
-
84958765510
-
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
-
Asiacrypt 2002, Springer
-
N. Courtois and J. Pieprzyk, "Cryptanalysis of Block Ciphers with Overdefined Systems of Equations", Asiacrypt 2002, LNCS 2501, Springer.
-
LNCS
, vol.2501
-
-
Courtois, N.1
Pieprzyk, J.2
-
7
-
-
35248828626
-
Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt
-
ICISC 2002, Springer
-
N. Courtois, "Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt", ICISC 2002, LNCS 2587, Springer.
-
LNCS
, vol.2587
-
-
Courtois, N.1
-
8
-
-
35248820612
-
Algebraic Attacks on Stream Ciphers with Linear Feedback
-
Eurocrypt 2003, Warsaw, Poland, Springer
-
N. Courtois and W. Meier, "Algebraic Attacks on Stream Ciphers with Linear Feedback", Eurocrypt 2003, Warsaw, Poland, LNCS 2656, pp. 345-359, Springer.
-
LNCS
, vol.2656
, pp. 345-359
-
-
Courtois, N.1
Meier, W.2
-
9
-
-
35248849880
-
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
-
Crypto 2003, Springer
-
N. Courtois, "Fast Algebraic Attacks on Stream Ciphers with Linear Feedback", Crypto 2003, LNCS 2729, Springer.
-
LNCS
, vol.2729
-
-
Courtois, N.1
-
10
-
-
0003868058
-
-
Springer-Verlag, New York
-
D. Cox, J. Little, and D. O'Shea, "Using Algebraic Geometry", Springer-Verlag, New York, 1998.
-
(1998)
Using Algebraic Geometry
-
-
Cox, D.1
Little, J.2
O'Shea, D.3
-
12
-
-
0036045901
-
5)
-
T. Mora, editor, ACM Press, July
-
5)", In T. Mora, editor, Proceeding of ISSAC, pages 75-83, ACM Press, July 2002.
-
(2002)
Proceeding of ISSAC
, pp. 75-83
-
-
Faugère, J.-C.1
-
13
-
-
25944479355
-
Efficient computation of zero-dimensional Gröbner bases by change of ordering
-
J.-C. Faugère, P. Gianni, D. Lazard, and T. Mora. "Efficient computation of zero-dimensional Gröbner bases by change of ordering". Journal of Symbolic Computation, 16(4):329-344, 1993.
-
(1993)
Journal of Symbolic Computation
, vol.16
, Issue.4
, pp. 329-344
-
-
Faugère, J.-C.1
Gianni, P.2
Lazard, D.3
Mora, T.4
-
14
-
-
35248840150
-
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner bases
-
Crypto 2003, Springer
-
J.-C. Faugère and A. Joux, "Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner bases", Crypto 2003, LNCS 2729, pp. 44-60, Springer.
-
LNCS
, vol.2729
, pp. 44-60
-
-
Faugère, J.-C.1
Joux, A.2
-
15
-
-
23944451880
-
Unbalanced Oil and Vinegar Signature Schemes
-
Springer-Verlag
-
A. Kipnis, J. Patarin, and L. Goubin, "Unbalanced Oil and Vinegar Signature Schemes", Eurocrypt 1999, Springer-Verlag, pp. 216-222.
-
Eurocrypt 1999
, pp. 216-222
-
-
Kipnis, A.1
Patarin, J.2
Goubin, L.3
-
16
-
-
20744433590
-
Cryptanalysis of the HFE Public Key Cryptosystem
-
Springer-Verlag
-
A. Kipnis and A. Shamir, "Cryptanalysis of the HFE Public Key Cryptosystem", Proceedings of Crypto'99, Springer-Verlag.
-
Proceedings of Crypto'99
-
-
Kipnis, A.1
Shamir, A.2
-
17
-
-
85034440461
-
Gröbner bases, Gaussian elimination and resolution of systems of algebraic equations
-
Computer algebra London, Springer
-
D. Lazard, "Gröbner bases, Gaussian elimination and resolution of systems of algebraic equations", Computer algebra (London, 1983), LNCS 162, pp. 146-156, Springer.
-
(1983)
LNCS
, vol.162
, pp. 146-156
-
-
Lazard, D.1
-
18
-
-
84947932132
-
Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms
-
J. Patarin, "Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms", Lecture Notes in Computer Science, 1070:33-48, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1070
, pp. 33-48
-
-
Patarin, J.1
-
19
-
-
84957640013
-
Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88
-
Crypto'95, Springer
-
J. Patarin, "Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88", Crypto'95, Springer, LNCS 963, pp. 248-261, 1995.
-
(1995)
LNCS
, vol.963
, pp. 248-261
-
-
Patarin, J.1
-
20
-
-
77649327985
-
Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations
-
Eurocrypt'2000, Springer
-
A. Shamir, J. Patarin, N. Courtois, and A. Klimov, "Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations", Eurocrypt'2000, LNCS 1807, Springer, pp. 392-407.
-
LNCS
, vol.1807
, pp. 392-407
-
-
Shamir, A.1
Patarin, J.2
Courtois, N.3
Klimov, A.4
-
22
-
-
33646781847
-
Relation between XL Algorithm and Gröbner Bases Algorithms
-
Report 2004/112
-
M. Sugita, M. Kawazoe and H. Imai, "Relation between XL Algorithm and Gröbner Bases Algorithms", Cryptology ePrint Archive, Report 2004/112, 2004, http://eprint.iacr.org/.
-
(2004)
Cryptology ePrint Archive
-
-
Sugita, M.1
Kawazoe, M.2
Imai, H.3
|