-
2
-
-
35048863447
-
Comparison between XL and Gröbner basis algorithms
-
(Pil Joong Lee, ed.), LNCS 3329 Springer, December
-
Gwénolé Ars, Jean-Charles Faugère, Hideki Imai, Mitsuru Kawazoe, and Makoto Sugita, Comparison between XL and Gröbner basis algorithms. ASIACRYPT 2004 (Pil Joong Lee, ed.), LNCS 3329, pp. 338-353. Springer, December 2004.
-
(2004)
ASIACRYPT 2004
, pp. 338-353
-
-
Ars, G.1
Faugère, J.-C.2
Imai, H.3
Kawazoe, M.4
Sugita, M.5
-
5
-
-
45449099251
-
-
Lecture Notes in Computer Science 5023 Springer
-
Luk Bettale, Jean-Charles Faugère, and Ludovic Perret, Cryptanalysis of the TRMS Signature Scheme of PKC'05. Progress in Cryptology -AFRICACRYPT 2008, Lecture Notes in Computer Science 5023, pp. 143-155. Springer, 2008.
-
(2008)
Cryptanalysis of the TRMS Signature Scheme of PKC'05. Progress in Cryptology -AFRICACRYPT 2008
, pp. 143-155
-
-
Bettale, L.1
Faugère, J.-C.2
Perret, L.3
-
6
-
-
67650146017
-
Security analysis of multivariate polynomials for hashing
-
Springer to appear
-
Luk Bettale, Jean-Charles Faugère, and Ludovic Perret, Security analysis of multivariate polynomials for hashing. Information Security and Cryptology -INSCRYPT 2008, Lecture Notes in Computer Science. Springer, 2008, to appear.
-
(2008)
Information Security and Cryptology -INSCRYPT 2008, Lecture Notes in Computer Science
-
-
Bettale, L.1
Faugère, J.-C.2
Perret, L.3
-
7
-
-
38149109062
-
On building hash functions from multivariate quadratic equations
-
Springer
-
Olivier Billet, Matthew J. B. Robshaw, and Thomas Peyrin, On building hash functions from multivariate quadratic equations. ACISP, LNCS 4586, pp. 82-95. Springer, 2007.
-
(2007)
ACISP, LNCS 4586
, pp. 82-95
-
-
Billet, O.1
Robshaw, M.J.B.2
Peyrin, T.3
-
8
-
-
51049092298
-
Time-area optimized public-key engines: MQ-cryptosystems as replacement for elliptic curves?
-
Springer-Verlag
-
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, and Christopher Wolf, Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?. CHES '08: Proceedings of the 10th international workshop on Cryptographic Hardware and Embedded Systems, pp. 45-61. Springer-Verlag, 2008.
-
(2008)
CHES '08: Proceedings of the 10th International Workshop on Cryptographic Hardware and Embedded Systems
, pp. 45-61
-
-
Bogdanov, A.1
Eisenbarth, T.2
Rupp, A.3
Wolf, C.4
-
9
-
-
24144434889
-
A study of the security of unbalanced oil and vinegar signature schemes
-
Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
-
An Braeken, Christopher Wolf, and Bart Preneel, A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes. Topics in Cryptology -CT-RSA 2005, LNCS 3376, pp. 29-43. Springer, February 2005. (Pubitemid 41231203)
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 29-43
-
-
Braeken, A.1
Wolf, C.2
Preneel, B.3
-
11
-
-
84858654766
-
Computer algebra symbolic and algebraic computation
-
Bruno Buchberger, Georges E. Collins, Rudiger G. K. Loos, and Rudolph Albrecht, Computer algebra symbolic and algebraic computation, SIGSAM Bull. 16 (1982), pp. 5-5.
-
(1982)
SIGSAM Bull.
, vol.16
, pp. 5-5
-
-
Buchberger, B.1
Collins, G.E.2
Loos, R.G.K.3
Albrecht, R.4
-
12
-
-
77649327985
-
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
-
Springer
-
Nicolas Courtois, Alexander Klimov, Jacques Patarin, and Adi Shamir, Efficient algorithms for solving overdefined systems of multivariate polynomial equations. Advances in Cryptology -EUROCRYPT 2000, LNCS 1807, pp. 392-407. Springer, 2000.
-
(2000)
Advances in Cryptology -EUROCRYPT 2000, LNCS 1807
, pp. 392-407
-
-
Courtois, N.1
Klimov, A.2
Patarin, J.3
Shamir, A.4
-
15
-
-
38049140588
-
Practical cryptanalysis of SFLASH
-
Springer
-
V Dubois, Pierre-Alain Fouque, Adi Shamir, and Jacques Stern, Practical Cryptanalysis of SFLASH. Advances in Cryptology -CRYPTO'07, 4622, pp. 1-12. Springer, 2007.
-
(2007)
Advances in Cryptology -CRYPTO'07
, vol.4622
, pp. 1-12
-
-
Dubois, V.1
Fouque, P.-A.2
Shamir, A.3
Stern, J.4
-
16
-
-
0033143274
-
A new efficient algorithm for computing Gröbner bases (F4)
-
Jean-Charles Faugère, A new efficient algorithm for computing Gröbner bases (F4), Journal of Pure and Applied Algebra 139 (1999), pp. 61-88.
-
(1999)
Journal of Pure and Applied Algebra
, vol.139
, pp. 61-88
-
-
Faugère, J.-C.1
-
18
-
-
25944479355
-
Efficient computation of zero-dimensional gröbner bases by change of ordering
-
Jean-Charles Faugère, Patrizia M. Gianni, Daniel Lazard, and Teo Mora, Efficient Computation of Zero-Dimensional Gröbner Bases by Change of Ordering, Journal of Symbolic Computation 16 (1993), pp. 329-344.
-
(1993)
Journal of Symbolic Computation
, vol.16
, pp. 329-344
-
-
Faugère, J.-C.1
Gianni, P.M.2
Lazard, D.3
Mora, T.4
-
22
-
-
84957693117
-
Unbalanced oil and vinegar signature
-
Springer-Verlag
-
Aviad Kipnis, Jacques Patarin, and Louis Goubin, Unbalanced Oil and Vinegar Signature. Advances in Cryptology -EUROCRYPT 1999, Lecture Notes in Computer Science 1592, pp. 206-222. Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology -EUROCRYPT 1999, Lecture Notes in Computer Science 1592
, pp. 206-222
-
-
Kipnis, A.1
Patarin, J.2
Goubin, L.3
-
24
-
-
85034440461
-
Gröbner-bases, gaussian elimination and resolution of systems of algebraic equations
-
Daniel Lazard, Gröbner-Bases, Gaussian elimination and resolution of systems of algebraic equations. EUROCAL, pp. 146-156, 1983.
-
(1983)
EUROCAL
, pp. 146-156
-
-
Lazard, D.1
-
25
-
-
85033537496
-
Public quadratic polynomial-tuples for efficient signature-verification and message-encryption
-
Springer-Verlag
-
Tsutomu Matsumoto and Hideki Imai, Public Quadratic Polynomial-tuples for Efficient Signature-Verification and Message-Encryption. Advances in Cryptology -EUROCRYPT 1988, LNCS 330, pp. 419-453. Springer-Verlag, 1988.
-
(1988)
Advances in Cryptology -EUROCRYPT 1988, LNCS 330
, pp. 419-453
-
-
Matsumoto, T.1
Imai, H.2
-
27
-
-
84937576636
-
-
Springer
-
Jacques Patarin, Nicolas Courtois, and Louis Goubin, QUARTZ, 128-Bit Long Digital Signatures. CT-RSA'01, 2020, pp. 282-297. Springer, 2001.
-
(2001)
QUARTZ, 128-Bit Long Digital Signatures. CT-RSA'01
, vol.2020
, pp. 282-297
-
-
Patarin, J.1
Courtois, N.2
Goubin, L.3
-
28
-
-
84947768941
-
* and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai
-
Advances in Cryptology - ASIACRYPT '98
-
Jacques Patarin, Louis Goubin, and Nicolas Courtois, C* -+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai. Advances in Cryptology -Asiacrypt'98, 1514, pp. 35-49. Springer, 1998. (Pubitemid 128151418)
-
(1998)
Lecture Notes in Computer Science
, Issue.1514
, pp. 35-49
-
-
Patarin, J.1
Goubin, L.2
Courtois, N.3
-
29
-
-
84858627767
-
Multivariate subresultants using Jouanolou's resultant matrices
-
accepted to
-
Agnes Szanto, Multivariate subresultants using Jouanolou's resultant matrices, accepted to Journal of Pure and Applied Algebra (2001).
-
(2001)
Journal of Pure and Applied Algebra
-
-
Szanto, A.1
-
31
-
-
19944425657
-
-
Cryptology ePrint Archive, Report2004/199
-
Xiaoyun Wang, Dengguo Feng, Xuejia Lai, and Hongbo Yu, Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD, Cryptology ePrint Archive, Report 2004/199, 2004.
-
(2004)
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
-
-
Wang, X.1
Feng, D.2
Lai, X.3
Yu, H.4
-
32
-
-
24944575304
-
Cryptanalysis of the hash functions MD4 and RIPEMD
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, and Xiuyuan Yu, Cryptanalysis of the Hash Functions MD4 and RIPEMD. EUROCRYPT (Ronald Cramer, ed.), LNCS 3494, pp. 1-18. Springer, 2005. (Pubitemid 41313943)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
33
-
-
33745171465
-
Finding collisions in the full SHA-1
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu, Finding Collisions in the Full SHA-1. CRYPTO (Victor Shoup, ed.), LNCS 3621, pp. 17-36. Springer, 2005. (Pubitemid 43902104)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621
, pp. 17-36
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
34
-
-
33745122987
-
Efficient collision search attacks on SHA-0
-
(Victor Shoup, ed.), LNCS 3621 Springer
-
Xiaoyun Wang, Hongbo Yu, and Yiqun Lisa Yin, Efficient Collision Search Attacks on SHA-0. CRYPTO (Victor Shoup, ed.), LNCS 3621, pp. 1-16. Springer, 2005.
-
(2005)
CRYPTO
, pp. 1-16
-
-
Wang, X.1
Yu, H.2
Lisa Yin, Y.3
-
35
-
-
40249092492
-
Taxonomy of public key schemes based on the problem of multivariate quadratic equations
-
Report2005/077
-
C.Wolf and B. Preneel, Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations, Cryptology ePrint Archive, Report 2005/077, 2005, http://eprint. iacr.org/.
-
(2005)
Cryptology EPrint Archive
-
-
Wolf, C.1
Preneel, B.2
-
36
-
-
33646811417
-
On asymptotic security estimates in XL and gröbner bases-related algebraic cryptanalysis
-
Bo-Yin Yang, Jiun-Ming Chen, and Nicolas Courtois, On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis. ICICS 2004, pp. 401-413, 2004. (Pubitemid 39737154)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3269
, pp. 401-413
-
-
Yang, B.-Y.1
Chen, J.-M.2
Courtois, N.T.3
|