메뉴 건너뛰기




Volumn 6225 LNCS, Issue , 2010, Pages 203-218

Fast exhaustive search for polynomial systems in F2

Author keywords

Exhaustive search; Graphic Processing Units (GPUs); Multivariate polynomials; Parallelization; Solving systems of equations

Indexed keywords

BUDGET CONTROL; CRYPTOGRAPHY; GRAPHICS PROCESSING UNIT; PROGRAM PROCESSORS; SMART CARDS;

EID: 78049336783     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15031-9_14     Document Type: Conference Paper
Times cited : (52)

References (26)
  • 2
    • 33746062308 scopus 로고    scopus 로고
    • On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations
    • INRIA report RR-5049
    • Bardet, M., Faugère, J.-C., Salvy, B.: On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations. In: Proc. Int'l Conference on Polynomial System Solving, pp. 71-74 (2004) INRIA report RR-5049
    • (2004) Proc. Int'l Conference on Polynomial System Solving , pp. 71-74
    • Bardet, M.1    Faugère, J.-C.2    Salvy, B.3
  • 3
    • 84860002294 scopus 로고    scopus 로고
    • Asymptotic expansion of the degree of regularity for semi-regular systems of equations
    • Bardet, M., Faugère, J.-C., Salvy, B., Yang, B.-Y.: Asymptotic expansion of the degree of regularity for semi-regular systems of equations. In: Proc. MEGA 2005(2005)
    • (2005) Proc. MEGA 2005
    • Bardet, M.1    Faugère, J.-C.2    Salvy, B.3    Yang, B.-Y.4
  • 4
    • 33746077698 scopus 로고    scopus 로고
    • QUAD: A practical stream cipher with provable security
    • Vaudenay, S. ed, Springer, Heidelberg
    • Berbain, C., Gilbert, H., Patarin, J.: QUAD: A practical stream cipher with provable security. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 109-128. Springer, Heidelberg (2006)
    • (2006) EUROCRYPT 2006. LNCS , vol.4004 , pp. 109-128
    • Berbain, C.1    Gilbert, H.2    Patarin, J.3
  • 6
    • 78049343086 scopus 로고    scopus 로고
    • Hybrid approach for solving multivariate systems over finite fields
    • Bettale, L., Faugére, J.-C., Perret, L.: Hybrid approach for solving multivariate systems over finite fields. J. Math. Crypto. 3(3), 177-197 (2009)
    • (2009) J. Math. Crypto , vol.3 , Issue.3 , pp. 177-197
    • Bettale, L.1    Faugére, J.-C.2    Perret, L.3
  • 10
    • 77953533804 scopus 로고    scopus 로고
    • Flexible partial enlargement to accelerate gröbner basis computation over F
    • Bernstein, D. J., Lange, T. eds., Springer, Heidelberg
    • Buchmann, J., Cabarcas, D., Ding, J., Mohamed, M. S. E.: Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F. In: Bernstein, D. J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 69-81. Springer, Heidelberg (2010)
    • (2010) AFRICACRYPT 2010. LNCS , vol.6055 , pp. 69-81
    • Buchmann, J.1    Cabarcas, D.2    Ding, J.3    Mohamed, M.S.E.4
  • 11
    • 50249137714 scopus 로고    scopus 로고
    • Algebraic and slide attacks on Keeloq
    • Nyberg, K. ed, Springer, Heidelberg
    • Courtois, N., Bard, G. V., Wagner, D.: Algebraic and slide attacks on Keeloq. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 97-115. Springer, Heidelberg (2008)
    • (2008) FSE 2008. LNCS , vol.5086 , pp. 97-115
    • Courtois, N.1    Bard, G.V.2    Wagner, D.3
  • 13
    • 77649327985 scopus 로고    scopus 로고
    • Efficient algorithms for solving overdefined systems of multivariate polynomial equations
    • Preneel, B. ed, Springer, Heidelberg, Extended ver.
    • Courtois, N. T., Klimov, A., Patarin, J., Shamir, A.: Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 392-407. Springer, Heidelberg (2000), Extended ver., http://www.minrank.org/xlfull.pdf
    • (2000) EUROCRYPT 2000. LNCS , vol.1807 , pp. 392-407
    • Courtois, N.T.1    Klimov, A.2    Patarin, J.3    Shamir, A.4
  • 14
    • 78049337610 scopus 로고
    • 2nd edition. Bibliotheca Mathematica, P. Noordhoff Ltd. XII, Groningen
    • de Bruijn, N.: Asymptotic methods in analysis. 2nd edition. Bibliotheca Mathematica. Vol. 4., 200 p. P. Noordhoff Ltd. XII, Groningen (1961)
    • (1961) Asymptotic Methods in Analysis , vol.4 , pp. 200
    • De Bruijn, N.1
  • 17
    • 35248840150 scopus 로고    scopus 로고
    • Algebraic cryptanalysis of Hidden Field Equations (HFE) using Gröbner bases
    • Boneh, D. ed, Springer, Heidelberg
    • Faugère, J.-C., Joux, A.: Algebraic cryptanalysis of Hidden Field Equations (HFE) using Gröbner bases. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 44-60. Springer, Heidelberg (2003)
    • (2003) CRYPTO 2003. LNCS , vol.2729 , pp. 44-60
    • Faugère, J.-C.1    Joux, A.2
  • 18
    • 78049344111 scopus 로고    scopus 로고
    • Copenhagen University, College of Engineering, Lists of Instruction Latencies, Throughputs and micro-operation breakdowns for Intel, AMD, and VIA CPUs February
    • Fog, A.: Instruction Tables. Copenhagen University, College of Engineering, Lists of Instruction Latencies, Throughputs and micro-operation breakdowns for Intel, AMD, and VIA CPUs (February 2010), http://www.agner.org/ optimize/instruction-tables.pdf
    • (2010) Instruction Tables
    • Fog, A.1
  • 19
    • 84955622221 scopus 로고    scopus 로고
    • Asymmetric cryptography with a hidden monomial
    • Koblitz, N. ed, Springer, Heidelberg
    • Patarin, J.: Asymmetric cryptography with a hidden monomial. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 45-60. Springer, Heidelberg (1996)
    • (1996) CRYPTO 1996. LNCS , vol.1109 , pp. 45-60
    • Patarin, J.1
  • 20
    • 84947932132 scopus 로고    scopus 로고
    • Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): Two new families of asymmetric algorithms
    • Maurer, U. M. ed, Springer, Heidelberg, Extended ver.
    • Patarin, J.: Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of asymmetric algorithms. In: Maurer, U. M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 33-48. Springer, Heidelberg (1996), Extended ver.: http://www.minrank.org/hfe.pdf
    • (1996) EUROCRYPT 1996. LNCS , vol.1070 , pp. 33-48
    • Patarin, J.1
  • 21
    • 84937576636 scopus 로고    scopus 로고
    • QUARTZ, 128-bit long digital signatures
    • Naccache, D. ed, Springer, Heidelberg
    • Patarin, J., Courtois, N., Goubin, L.: QUARTZ, 128-bit long digital signatures. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 282-297. Springer, Heidelberg (2001), http://www.minrank.org/quartz/
    • (2001) CT-RSA 2001. LNCS , vol.2020 , pp. 282-297
    • Patarin, J.1    Courtois, N.2    Goubin, L.3
  • 22
    • 84957654670 scopus 로고    scopus 로고
    • Improved algorithms for Isomorphisms of Polynomials
    • Nyberg, K. ed, Springer, Heidelberg, Extended ver.
    • Patarin, J., Goubin, L., Courtois, N.: Improved algorithms for Isomorphisms of Polynomials. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 184-200. Springer, Heidelberg (1998); Extended ver.: http://www.minrank.org/ip6long.ps
    • (1998) EUROCRYPT 1998. LNCS , vol.1403 , pp. 184-200
    • Patarin, J.1    Goubin, L.2    Courtois, N.3
  • 23
    • 38549162006 scopus 로고    scopus 로고
    • MRHS equation systems
    • Adams, C., Miri, A., Wiener, M. eds., Springer, Heidelberg
    • Raddum, H.: MRHS equation systems. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 232-245. Springer, Heidelberg (2007)
    • (2007) SAC 2007. LNCS , vol.4876 , pp. 232-245
    • Raddum, H.1
  • 24
    • 38349029413 scopus 로고    scopus 로고
    • Algebraic cryptanalysis of 58-round SHA-1
    • Biryukov, A. ed, Springer, Heidelberg
    • Sugita, M., Kawazoe, M., Perret, L., Imai, H.: Algebraic cryptanalysis of 58-round SHA-1. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 349-365. Springer, Heidelberg (2007)
    • (2007) FSE 2007. LNCS , vol.4593 , pp. 349-365
    • Sugita, M.1    Kawazoe, M.2    Perret, L.3    Imai, H.4
  • 25
    • 33646770907 scopus 로고    scopus 로고
    • Theoretical analysis of XL over small fields
    • Wang, H., Pieprzyk, J., Varadharajan, V. eds., Springer, Heidelberg
    • Yang, B.-Y., Chen, J.-M.: Theoretical analysis of XL over small fields. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 277-288. Springer, Heidelberg (2004)
    • (2004) ACISP 2004. LNCS , vol.3108 , pp. 277-288
    • Yang, B.-Y.1    Chen, J.-M.2
  • 26
    • 33646811417 scopus 로고    scopus 로고
    • On asymptotic security estimates in XL and Gröbner bases-related algebraic cryptanalysis
    • López, J., Qing, S., Okamoto, E. eds., Springer, Heidelberg
    • Yang, B.-Y., Chen, J.-M., Courtois, N.: On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 401-413. Springer, Heidelberg (2004)
    • (2004) ICICS 2004. LNCS , vol.3269 , pp. 401-413
    • Yang, B.-Y.1    Chen, J.-M.2    Courtois, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.