-
2
-
-
67650110016
-
Complexity study of Gröbner basis computation
-
Bardet, M., Faug̀ere, J.-C., Salvy, B.: Complexity study of Gröbner basis computation. Technical report, INRIA (2002), http://www.inria.fr/rrrt/rr-5049.html
-
(2002)
Technical Report, INRIA
-
-
Bardet, M.1
Faug̀ere, J.-C.2
Salvy, B.3
-
3
-
-
33746062308
-
On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations
-
Bardet, M., Faug̀ere, J.-C., Salvy, B.: On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations. In: Proc. International Conference on Polynomial System Solving (ICPSS), pp. 71-75 (2004)
-
(2004)
Proc. International Conference on Polynomial System Solving (ICPSS)
, pp. 71-75
-
-
Bardet, M.1
Faug̀ere, J.-C.2
Salvy, B.3
-
4
-
-
84860002294
-
Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems
-
Eighth International Symposium on Effective Methods in Algebraic Geometry (2005)
-
Bardet, M., Faug̀ere, J.-C., Salvy, B., Yang, B.-Y.: Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems. In: Proc. of MEGA 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry (2005)
-
(2005)
Proc. of MEGA
-
-
Bardet, M.1
Faug̀ere, J.-C.2
Salvy, B.3
Yang, B.-Y.4
-
5
-
-
51049092298
-
Time-area optimized publickey engines: MQ-cryptosystems as replacement for elliptic curves?
-
Oswald, E., Rohatgi, P. (eds.) CHES 2008., Springer, Heidelberg
-
Bogdanov, A., Eisenbarth, T., Rupp, A., Wolf, C.: Time-area optimized publickey engines: MQ-cryptosystems as replacement for elliptic curves? In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.5154, pp. 45-61. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5154
, pp. 45-61
-
-
Bogdanov, A.1
Eisenbarth, T.2
Rupp, A.3
Wolf, C.4
-
6
-
-
35048862324
-
A new variant of the matsumoto-imai cryptosystem through perturbation
-
Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004., Springer, Heidelberg
-
Ding, J.: A new variant of the matsumoto-imai cryptosystem through perturbation. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.2947, pp. 305-318. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2947
, pp. 305-318
-
-
Ding, J.1
-
7
-
-
38049140588
-
Practical cryptanalysis of sflash
-
Menezes,A. (ed.) CRYPTO 2007., Springer, Heidelberg
-
Dubois, V., Fouque, P.-A., Shamir, A., Stern, J.: Practical cryptanalysis of sflash. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.4622, pp. 1-12. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 1-12
-
-
Dubois, V.1
Fouque, P.-A.2
Shamir, A.3
Stern, J.4
-
8
-
-
0036045901
-
A new efficient algorithm for computing Gröbner bases without reduction to zero (F5)
-
Mora, T. (ed.), July, ACM Press, New York, (2002) ISBN: 1-58113-484-3
-
Faug̀ere, J.-C.: A new efficient algorithm for computing Gröbner bases without reduction to zero (F5). In: Mora, T. (ed.) Proceedings of the 2002 International Symposium on Symbolic and Algebraic Computation ISSAC, July 2002, pp. 75-83. ACM Press, New York (2002) ISBN: 1-58113-484-3
-
(2002)
Proceedings of the 2002 International Symposium on Symbolic and Algebraic Computation ISSAC
, pp. 75-83
-
-
Faug̀ere, J.-C.1
-
9
-
-
35248840150
-
Algebraic cryptanalysis of hidden field equation (hfe) cryptosystems using gröbner bases
-
Boneh, D. (ed.) CRYPTO 2003., Springer, Heidelberg
-
Faug̀ere, J.-C., Joux, A.: Algebraic cryptanalysis of Hidden Field Equation (HFE) cryptosystems using Gröbner bases. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.2729, pp. 44-60. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 44-60
-
-
Faug̀ere, J.-C.1
Joux, A.2
-
10
-
-
24944454273
-
Differential cryptanalysis for multivariate schemes
-
Cramer, R. (ed.) EUROCRYPT 2005., Springer, Heidelberg
-
Fouque, P.-A., Granboulan, L., Stern, J.: Differential cryptanalysis for multivariate schemes. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.3494, pp. 341-353. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 341-353
-
-
Fouque, P.-A.1
Granboulan, L.2
Stern, J.3
-
11
-
-
33749551989
-
Inverting HFE is quasipolynomial
-
Dwork, C. (ed.) CRYPTO 2006., Springer, Heidelberg
-
Granboulan, L., Joux, A., Stern, J.: Inverting HFE is quasipolynomial. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.4117, pp. 345-356. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 345-356
-
-
Granboulan, L.1
Joux, A.2
Stern, J.3
-
12
-
-
85022127411
-
Algebraic methods for constructing asymmetric cryptosystems
-
Calmet, J. (ed.) AAECC 1985., Springer, Heidelberg
-
Imai, H., Matsumoto, T.: Algebraic Methods for Constructing Asymmetric Cryptosystems. In: Calmet, J. (ed.) AAECC 1985. LNCS, vol.229, pp. 108-119. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.229
, pp. 108-119
-
-
Imai, H.1
Matsumoto, T.2
-
13
-
-
84957613067
-
Cryptanalysis of the oil and vinegar signature scheme
-
Krawczyk, H. (ed.) CRYPTO 1998., Springer, Heidelberg
-
Kipnis, A., Shamir, A.: Cryptanalysis of the oil and vinegar signature scheme. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.1462, pp. 257-266. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 257-266
-
-
Kipnis, A.1
Shamir, A.2
-
16
-
-
85033537496
-
Public quadratic polynomial-tuples for efficient signatureverification and message-encryption
-
Günther, C.G. (ed.) EUROCRYPT 1988., Springer, Heidelberg
-
Matsumoto, T., Imai, H.: Public quadratic polynomial-tuples for efficient signatureverification and message-encryption. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol.330, pp. 419-453. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.330
, pp. 419-453
-
-
Matsumoto, T.1
Imai, H.2
-
17
-
-
84957640013
-
Cryptanalysis of the matsumoto and imai public key scheme of eurocrypt' 88
-
Coppersmith, D. (ed.) CRYPTO 1995., Springer, Heidelberg
-
Patarin, J.: Cryptanalysis of the matsumoto and imai public key scheme of eurocrypt' 88. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.963, pp. 248-261. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.963
, pp. 248-261
-
-
Patarin, J.1
-
18
-
-
84947932132
-
Hidden fields equations (hfe) and isomorphisms of polynomials (ip): Two new families of asymmetric algorithms
-
Maurer, U.M. (ed.) EUROCRYPT 1996., Springer, Heidelberg
-
Patarin, J.: Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of asymmetric algorithms. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.1070, pp. 33-48. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 33-48
-
-
Patarin, J.1
-
19
-
-
33645599274
-
The oil and vinegar signature scheme
-
Presented at the
-
Patarin, J.: The Oil and Vinegar signature scheme. Presented at the Dagstuhl Workshop on Cryptography (1997)
-
(1997)
Dagstuhl Workshop on Cryptography
-
-
Patarin, J.1
-
20
-
-
84947768941
-
C + and HM: Variations on Two Schemes of T.Matsumoto and H.Imai
-
Ohta, K., Pei, D. (eds.) ASIACRYPT 1998., Springer, Heidelberg
-
Patarin, J., Courtois, N., Goubin, L.: C+ and HM: Variations on Two Schemes of T.Matsumoto and H.Imai. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.1514, pp. 35-50. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1514
, pp. 35-50
-
-
Patarin, J.1
Courtois, N.2
Goubin, L.3
-
22
-
-
84937576636
-
Quartz, 128-bit long digital signatures
-
Naccache, D. (ed.) CT-RSA 2001, Springer, Heidelberg
-
Patarin, J., Courtois, N., Goubin, L.: Quartz, 128-bit long digital signatures. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.2020, pp. 282-297. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2020
, pp. 282-297
-
-
Patarin, J.1
Courtois, N.2
Goubin, L.3
-
23
-
-
84947768941
-
C+ and hm: Variations around two schemes of t.matsumoto and h.imai
-
Ohta, K., Pei, D. (eds.) ASIACRYPT 1998, Springer, Heidelberg
-
Patarin, J., Goubin, L., Courtois, N.: C+ and hm: Variations around two schemes of t.matsumoto and h.imai. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.1514, pp. 35-49. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1514
, pp. 35-49
-
-
Patarin, J.1
Goubin, L.2
Courtois, N.3
-
24
-
-
40249092492
-
Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations
-
Report(2005) 077)
-
Wolf, C., Preneel, B.: Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations. Cryptology ePrint Archive, Report 2005/077 (2005), http://eprint.iacr.org/
-
(2005)
Cryptology EPrint Archive
-
-
Wolf, C.1
Preneel, B.2
-
25
-
-
24944488104
-
Perturbed hidden matrix cryptosystems
-
Gervasi, O., Gavrilova, M.L., Kumar, V., Lagańa, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005., Springer, Heidelberg
-
Wu, Z., Ding, J., Gower, J.E., Ye, D.F.: Perturbed hidden matrix cryptosystems. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Lagańa, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol.3481, pp. 595-602. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3481
, pp. 595-602
-
-
Wu, Z.1
Ding, J.2
Gower, J.E.3
Ye, D.F.4
|