-
2
-
-
33746062308
-
On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations
-
INRIA report RR-5049
-
Bardet, M., Faugère, J.-C., Salvy, B.: On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations. In: Proc. Int'l Conference on Polynomial System Solving, pp. 71-74 (2004) INRIA report RR-5049
-
(2004)
Proc. Int'l Conference on Polynomial System Solving
, pp. 71-74
-
-
Bardet, M.1
Faugère, J.-C.2
Salvy, B.3
-
3
-
-
84860002294
-
Asymptotic expansion of the degree of regularity for semi-regular systems of equations
-
Bardet, M., Faugère, J.-C., Salvy, B., Yang, B.-Y.: Asymptotic expansion of the degree of regularity for semi-regular systems of equations. In: Proc. MEGA 2005(2005)
-
(2005)
Proc. MEGA 2005
-
-
Bardet, M.1
Faugère, J.-C.2
Salvy, B.3
Yang, B.-Y.4
-
4
-
-
33746077698
-
QUAD: A practical stream cipher with provable security
-
Vaudenay, S. ed, Springer, Heidelberg
-
Berbain, C., Gilbert, H., Patarin, J.: QUAD: A practical stream cipher with provable security. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 109-128. Springer, Heidelberg (2006)
-
(2006)
EUROCRYPT 2006. LNCS
, vol.4004
, pp. 109-128
-
-
Berbain, C.1
Gilbert, H.2
Patarin, J.3
-
5
-
-
67650679679
-
ECM on graphics cards
-
Joux, A. ed, Springer, Heidelberg
-
Bernstein, D. J., Chen, T.-R., Cheng, C.-M., Lange, T., Yang, B.-Y: ECM on graphics cards. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 483-501. Springer, Heidelberg (2010)
-
(2010)
EUROCRYPT 2009. LNCS
, vol.5479
, pp. 483-501
-
-
Bernstein, D.J.1
Chen, T.-R.2
Cheng, C.-M.3
Lange, T.4
Yang, B.-Y.5
-
6
-
-
78049343086
-
Hybrid approach for solving multivariate systems over finite fields
-
Bettale, L., Faugére, J.-C., Perret, L.: Hybrid approach for solving multivariate systems over finite fields. J. Math. Crypto. 3(3), 177-197 (2009)
-
(2009)
J. Math. Crypto
, vol.3
, Issue.3
, pp. 177-197
-
-
Bettale, L.1
Faugére, J.-C.2
Perret, L.3
-
7
-
-
84871551173
-
-
Bouillaguet, C., Faugére, J.-C., Fouque, P.-A., Perret, L.: Differential-algebraic algorithms for the isomorphism of polynomials problem, http://eprint.iacr.org/2009/583
-
Differential-algebraic Algorithms for the Isomorphism of Polynomials Problem
-
-
Bouillaguet, C.1
Faugére, J.-C.2
Fouque, P.-A.3
Perret, L.4
-
8
-
-
78049349027
-
-
Bouillaguet, C., Fouque, P.-A., Joux, A., Treger, J.: A family of weak keys in HFE (and the corresponding practical key-recovery), http://eprint.iacr. org/2009/619
-
A Family of Weak Keys in HFE (and the corresponding practical key-recovery)
-
-
Bouillaguet, C.1
Fouque, P.-A.2
Joux, A.3
Treger, J.4
-
10
-
-
77953533804
-
Flexible partial enlargement to accelerate gröbner basis computation over F
-
Bernstein, D. J., Lange, T. eds., Springer, Heidelberg
-
Buchmann, J., Cabarcas, D., Ding, J., Mohamed, M. S. E.: Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F. In: Bernstein, D. J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 69-81. Springer, Heidelberg (2010)
-
(2010)
AFRICACRYPT 2010. LNCS
, vol.6055
, pp. 69-81
-
-
Buchmann, J.1
Cabarcas, D.2
Ding, J.3
Mohamed, M.S.E.4
-
11
-
-
50249137714
-
Algebraic and slide attacks on Keeloq
-
Nyberg, K. ed, Springer, Heidelberg
-
Courtois, N., Bard, G. V., Wagner, D.: Algebraic and slide attacks on Keeloq. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 97-115. Springer, Heidelberg (2008)
-
(2008)
FSE 2008. LNCS
, vol.5086
, pp. 97-115
-
-
Courtois, N.1
Bard, G.V.2
Wagner, D.3
-
13
-
-
77649327985
-
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
-
Preneel, B. ed, Springer, Heidelberg, Extended ver.
-
Courtois, N. T., Klimov, A., Patarin, J., Shamir, A.: Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 392-407. Springer, Heidelberg (2000), Extended ver., http://www.minrank.org/xlfull.pdf
-
(2000)
EUROCRYPT 2000. LNCS
, vol.1807
, pp. 392-407
-
-
Courtois, N.T.1
Klimov, A.2
Patarin, J.3
Shamir, A.4
-
14
-
-
78049337610
-
-
2nd edition. Bibliotheca Mathematica, P. Noordhoff Ltd. XII, Groningen
-
de Bruijn, N.: Asymptotic methods in analysis. 2nd edition. Bibliotheca Mathematica. Vol. 4., 200 p. P. Noordhoff Ltd. XII, Groningen (1961)
-
(1961)
Asymptotic Methods in Analysis
, vol.4
, pp. 200
-
-
De Bruijn, N.1
-
17
-
-
35248840150
-
Algebraic cryptanalysis of Hidden Field Equations (HFE) using Gröbner bases
-
Boneh, D. ed, Springer, Heidelberg
-
Faugère, J.-C., Joux, A.: Algebraic cryptanalysis of Hidden Field Equations (HFE) using Gröbner bases. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 44-60. Springer, Heidelberg (2003)
-
(2003)
CRYPTO 2003. LNCS
, vol.2729
, pp. 44-60
-
-
Faugère, J.-C.1
Joux, A.2
-
18
-
-
78049344111
-
-
Copenhagen University, College of Engineering, Lists of Instruction Latencies, Throughputs and micro-operation breakdowns for Intel, AMD, and VIA CPUs February
-
Fog, A.: Instruction Tables. Copenhagen University, College of Engineering, Lists of Instruction Latencies, Throughputs and micro-operation breakdowns for Intel, AMD, and VIA CPUs (February 2010), http://www.agner.org/ optimize/instruction-tables.pdf
-
(2010)
Instruction Tables
-
-
Fog, A.1
-
19
-
-
84955622221
-
Asymmetric cryptography with a hidden monomial
-
Koblitz, N. ed, Springer, Heidelberg
-
Patarin, J.: Asymmetric cryptography with a hidden monomial. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 45-60. Springer, Heidelberg (1996)
-
(1996)
CRYPTO 1996. LNCS
, vol.1109
, pp. 45-60
-
-
Patarin, J.1
-
20
-
-
84947932132
-
Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): Two new families of asymmetric algorithms
-
Maurer, U. M. ed, Springer, Heidelberg, Extended ver.
-
Patarin, J.: Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of asymmetric algorithms. In: Maurer, U. M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 33-48. Springer, Heidelberg (1996), Extended ver.: http://www.minrank.org/hfe.pdf
-
(1996)
EUROCRYPT 1996. LNCS
, vol.1070
, pp. 33-48
-
-
Patarin, J.1
-
21
-
-
84937576636
-
QUARTZ, 128-bit long digital signatures
-
Naccache, D. ed, Springer, Heidelberg
-
Patarin, J., Courtois, N., Goubin, L.: QUARTZ, 128-bit long digital signatures. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 282-297. Springer, Heidelberg (2001), http://www.minrank.org/quartz/
-
(2001)
CT-RSA 2001. LNCS
, vol.2020
, pp. 282-297
-
-
Patarin, J.1
Courtois, N.2
Goubin, L.3
-
22
-
-
84957654670
-
Improved algorithms for Isomorphisms of Polynomials
-
Nyberg, K. ed, Springer, Heidelberg, Extended ver.
-
Patarin, J., Goubin, L., Courtois, N.: Improved algorithms for Isomorphisms of Polynomials. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 184-200. Springer, Heidelberg (1998); Extended ver.: http://www.minrank.org/ip6long.ps
-
(1998)
EUROCRYPT 1998. LNCS
, vol.1403
, pp. 184-200
-
-
Patarin, J.1
Goubin, L.2
Courtois, N.3
-
23
-
-
38549162006
-
MRHS equation systems
-
Adams, C., Miri, A., Wiener, M. eds., Springer, Heidelberg
-
Raddum, H.: MRHS equation systems. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 232-245. Springer, Heidelberg (2007)
-
(2007)
SAC 2007. LNCS
, vol.4876
, pp. 232-245
-
-
Raddum, H.1
-
24
-
-
38349029413
-
Algebraic cryptanalysis of 58-round SHA-1
-
Biryukov, A. ed, Springer, Heidelberg
-
Sugita, M., Kawazoe, M., Perret, L., Imai, H.: Algebraic cryptanalysis of 58-round SHA-1. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 349-365. Springer, Heidelberg (2007)
-
(2007)
FSE 2007. LNCS
, vol.4593
, pp. 349-365
-
-
Sugita, M.1
Kawazoe, M.2
Perret, L.3
Imai, H.4
-
25
-
-
33646770907
-
Theoretical analysis of XL over small fields
-
Wang, H., Pieprzyk, J., Varadharajan, V. eds., Springer, Heidelberg
-
Yang, B.-Y., Chen, J.-M.: Theoretical analysis of XL over small fields. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 277-288. Springer, Heidelberg (2004)
-
(2004)
ACISP 2004. LNCS
, vol.3108
, pp. 277-288
-
-
Yang, B.-Y.1
Chen, J.-M.2
-
26
-
-
33646811417
-
On asymptotic security estimates in XL and Gröbner bases-related algebraic cryptanalysis
-
López, J., Qing, S., Okamoto, E. eds., Springer, Heidelberg
-
Yang, B.-Y., Chen, J.-M., Courtois, N.: On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 401-413. Springer, Heidelberg (2004)
-
(2004)
ICICS 2004. LNCS
, vol.3269
, pp. 401-413
-
-
Yang, B.-Y.1
Chen, J.-M.2
Courtois, N.3
|