메뉴 건너뛰기




Volumn 3, Issue 3, 2009, Pages 177-197

Hybrid approach for solving multivariate systems over finite fields

Author keywords

Gr bner bases; Multivariate cryptography

Indexed keywords


EID: 78049343086     PISSN: 18622976     EISSN: 18622984     Source Type: Journal    
DOI: 10.1515/JMC.2009.009     Document Type: Article
Times cited : (144)

References (36)
  • 2
    • 35048863447 scopus 로고    scopus 로고
    • Comparison between XL and Gröbner basis algorithms
    • (Pil Joong Lee, ed.), LNCS 3329 Springer, December
    • Gwénolé Ars, Jean-Charles Faugère, Hideki Imai, Mitsuru Kawazoe, and Makoto Sugita, Comparison between XL and Gröbner basis algorithms. ASIACRYPT 2004 (Pil Joong Lee, ed.), LNCS 3329, pp. 338-353. Springer, December 2004.
    • (2004) ASIACRYPT 2004 , pp. 338-353
    • Ars, G.1    Faugère, J.-C.2    Imai, H.3    Kawazoe, M.4    Sugita, M.5
  • 7
    • 38149109062 scopus 로고    scopus 로고
    • On building hash functions from multivariate quadratic equations
    • Springer
    • Olivier Billet, Matthew J. B. Robshaw, and Thomas Peyrin, On building hash functions from multivariate quadratic equations. ACISP, LNCS 4586, pp. 82-95. Springer, 2007.
    • (2007) ACISP, LNCS 4586 , pp. 82-95
    • Billet, O.1    Robshaw, M.J.B.2    Peyrin, T.3
  • 9
    • 24144434889 scopus 로고    scopus 로고
    • A study of the security of unbalanced oil and vinegar signature schemes
    • Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
    • An Braeken, Christopher Wolf, and Bart Preneel, A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes. Topics in Cryptology -CT-RSA 2005, LNCS 3376, pp. 29-43. Springer, February 2005. (Pubitemid 41231203)
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 29-43
    • Braeken, A.1    Wolf, C.2    Preneel, B.3
  • 11
    • 84858654766 scopus 로고
    • Computer algebra symbolic and algebraic computation
    • Bruno Buchberger, Georges E. Collins, Rudiger G. K. Loos, and Rudolph Albrecht, Computer algebra symbolic and algebraic computation, SIGSAM Bull. 16 (1982), pp. 5-5.
    • (1982) SIGSAM Bull. , vol.16 , pp. 5-5
    • Buchberger, B.1    Collins, G.E.2    Loos, R.G.K.3    Albrecht, R.4
  • 12
    • 77649327985 scopus 로고    scopus 로고
    • Efficient algorithms for solving overdefined systems of multivariate polynomial equations
    • Springer
    • Nicolas Courtois, Alexander Klimov, Jacques Patarin, and Adi Shamir, Efficient algorithms for solving overdefined systems of multivariate polynomial equations. Advances in Cryptology -EUROCRYPT 2000, LNCS 1807, pp. 392-407. Springer, 2000.
    • (2000) Advances in Cryptology -EUROCRYPT 2000, LNCS 1807 , pp. 392-407
    • Courtois, N.1    Klimov, A.2    Patarin, J.3    Shamir, A.4
  • 16
    • 0033143274 scopus 로고    scopus 로고
    • A new efficient algorithm for computing Gröbner bases (F4)
    • Jean-Charles Faugère, A new efficient algorithm for computing Gröbner bases (F4), Journal of Pure and Applied Algebra 139 (1999), pp. 61-88.
    • (1999) Journal of Pure and Applied Algebra , vol.139 , pp. 61-88
    • Faugère, J.-C.1
  • 18
    • 25944479355 scopus 로고
    • Efficient computation of zero-dimensional gröbner bases by change of ordering
    • Jean-Charles Faugère, Patrizia M. Gianni, Daniel Lazard, and Teo Mora, Efficient Computation of Zero-Dimensional Gröbner Bases by Change of Ordering, Journal of Symbolic Computation 16 (1993), pp. 329-344.
    • (1993) Journal of Symbolic Computation , vol.16 , pp. 329-344
    • Faugère, J.-C.1    Gianni, P.M.2    Lazard, D.3    Mora, T.4
  • 24
    • 85034440461 scopus 로고
    • Gröbner-bases, gaussian elimination and resolution of systems of algebraic equations
    • Daniel Lazard, Gröbner-Bases, Gaussian elimination and resolution of systems of algebraic equations. EUROCAL, pp. 146-156, 1983.
    • (1983) EUROCAL , pp. 146-156
    • Lazard, D.1
  • 25
    • 85033537496 scopus 로고
    • Public quadratic polynomial-tuples for efficient signature-verification and message-encryption
    • Springer-Verlag
    • Tsutomu Matsumoto and Hideki Imai, Public Quadratic Polynomial-tuples for Efficient Signature-Verification and Message-Encryption. Advances in Cryptology -EUROCRYPT 1988, LNCS 330, pp. 419-453. Springer-Verlag, 1988.
    • (1988) Advances in Cryptology -EUROCRYPT 1988, LNCS 330 , pp. 419-453
    • Matsumoto, T.1    Imai, H.2
  • 28
    • 84947768941 scopus 로고    scopus 로고
    • * and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai
    • Advances in Cryptology - ASIACRYPT '98
    • Jacques Patarin, Louis Goubin, and Nicolas Courtois, C* -+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai. Advances in Cryptology -Asiacrypt'98, 1514, pp. 35-49. Springer, 1998. (Pubitemid 128151418)
    • (1998) Lecture Notes in Computer Science , Issue.1514 , pp. 35-49
    • Patarin, J.1    Goubin, L.2    Courtois, N.3
  • 29
    • 84858627767 scopus 로고    scopus 로고
    • Multivariate subresultants using Jouanolou's resultant matrices
    • accepted to
    • Agnes Szanto, Multivariate subresultants using Jouanolou's resultant matrices, accepted to Journal of Pure and Applied Algebra (2001).
    • (2001) Journal of Pure and Applied Algebra
    • Szanto, A.1
  • 32
    • 24944575304 scopus 로고    scopus 로고
    • Cryptanalysis of the hash functions MD4 and RIPEMD
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, and Xiuyuan Yu, Cryptanalysis of the Hash Functions MD4 and RIPEMD. EUROCRYPT (Ronald Cramer, ed.), LNCS 3494, pp. 1-18. Springer, 2005. (Pubitemid 41313943)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 1-18
    • Wang, X.1    Lai, X.2    Feng, D.3    Chen, H.4    Yu, X.5
  • 34
    • 33745122987 scopus 로고    scopus 로고
    • Efficient collision search attacks on SHA-0
    • (Victor Shoup, ed.), LNCS 3621 Springer
    • Xiaoyun Wang, Hongbo Yu, and Yiqun Lisa Yin, Efficient Collision Search Attacks on SHA-0. CRYPTO (Victor Shoup, ed.), LNCS 3621, pp. 1-16. Springer, 2005.
    • (2005) CRYPTO , pp. 1-16
    • Wang, X.1    Yu, H.2    Lisa Yin, Y.3
  • 35
    • 40249092492 scopus 로고    scopus 로고
    • Taxonomy of public key schemes based on the problem of multivariate quadratic equations
    • Report2005/077
    • C.Wolf and B. Preneel, Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations, Cryptology ePrint Archive, Report 2005/077, 2005, http://eprint. iacr.org/.
    • (2005) Cryptology EPrint Archive
    • Wolf, C.1    Preneel, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.