메뉴 건너뛰기




Volumn 6571 LNCS, Issue , 2011, Pages 441-458

Cryptanalysis of multivariate and Odd-characteristic HFE variants

Author keywords

Gr bner bases; Hidden Field Equations; MinRank

Indexed keywords

EXTENSION FIELD; HIDDEN FIELD EQUATIONS; KEY RECOVERY ATTACKS; MINRANK; PROOF OF CONCEPT; PUBLIC KEYS;

EID: 79952495417     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19379-8_27     Document Type: Conference Paper
Times cited : (22)

References (31)
  • 1
    • 0003611980 scopus 로고
    • An introduction to gröbner bases. Graduate studies in mahematics
    • Adams, W.W., Loustaunau, P.: An Introduction to Gröbner Bases. Graduate Studies in Mahematics, vol. 3. AMS, Providence (1994)
    • (1994) AMS, Providence , vol.3
    • Adams, W.W.1    Loustaunau, P.2
  • 5
  • 6
    • 51049092298 scopus 로고    scopus 로고
    • Time-area optimized publickey engines: MQ-cryptosystems as replacement for elliptic curves?
    • Oswald, E., Rohatgi, P. (eds., Springer, Heidelberg
    • Bogdanov, A., Eisenbarth, T., Rupp, A., Wolf, C.: Time-area optimized publickey engines: MQ-cryptosystems as replacement for elliptic curves? In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 45-61. Springer, Heidelberg (2008)
    • (2008) CHES 2008. LNCS , vol.5154 , pp. 45-61
    • Bogdanov, A.1    Eisenbarth, T.2    Rupp, A.3    Wolf, C.4
  • 7
    • 0031232428 scopus 로고    scopus 로고
    • The Magma algebra system I: The user language
    • Bosma, W., Cannon, J.J., Playoust, C.: The Magma algebra system I: The user language. Journal of Symbolic Computation 24(3-4), 235-265 (1997) (Pubitemid 127167874)
    • (1997) Journal of Symbolic Computation , vol.24 , Issue.3-4 , pp. 235-265
    • Bosma, W.1    Cannon, J.2    Playoust, C.3
  • 10
    • 70350604666 scopus 로고    scopus 로고
    • SSE implementation of multivariate PKCs on modern x86 CPUs
    • Clavier, C., Gaj, K. (eds., Springer, Heidelberg
    • Chen, A.I.-T., Chen, M.-S., Chen, T.-R., Cheng, C.-M., Ding, J., Kuo, E.L.-H., Lee, F.Y.-S., Yang, B.-Y.: SSE implementation of multivariate PKCs on modern x86 CPUs. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 33-48. Springer, Heidelberg (2009)
    • (2009) CHES 2009. LNCS , vol.5747 , pp. 33-48
    • Chen, A.I.-T.1    Chen, M.-S.2    Chen, T.-R.3    Cheng, C.-M.4    Ding, J.5    Kuo, E.L.-H.6    Lee, F.Y.-S.7    Yang, B.-Y.8
  • 12
    • 84946828059 scopus 로고    scopus 로고
    • Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
    • Advances in Cryptology - ASIACRYPT 2001
    • Courtois, N.T.: Efficient zero-knowledge authentication based on a linear algebra problem MinRank. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 402-421. Springer, Heidelberg (2001) (Pubitemid 33371198)
    • (2002) Lecture Notes in Computer Science , Issue.2248 , pp. 402-421
    • Courtois, N.T.1
  • 14
    • 56649111148 scopus 로고    scopus 로고
    • Algebraic attack on HFE revisited
    • Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds., Springer, Heidelberg
    • Ding, J., Schmidt, D., Werner, F.: Algebraic attack on HFE revisited. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 215-227. Springer, Heidelberg (2008)
    • (2008) ISC 2008. LNCS , vol.5222 , pp. 215-227
    • Ding, J.1    Schmidt, D.2    Werner, F.3
  • 15
    • 0033143274 scopus 로고    scopus 로고
    • A new efficient algorithm for computing Gröbner bases (F4)
    • Faug̀ere, J.-C.: A new efficient algorithm for computing Gröbner bases (F4). Journal of Pure and Applied Algebra 139, 61-88 (1999)
    • (1999) Journal of Pure and Applied Algebra , vol.139 , pp. 61-88
    • Faug̀ere, J.-C.1
  • 17
    • 33646827958 scopus 로고    scopus 로고
    • Algebraic cryptanalysis of HFE using Gröbner bases
    • Faug̀ere, J.-C.: Algebraic cryptanalysis of HFE using Gröbner bases. Reasearch report RR-4738, INRIA (2003), http://hal.inria.fr/inria- 00071849/PDF/RR-4738.pdf
    • (2003) Reasearch Report RR-4738, INRIA
    • Faug̀ere, J.-C.1
  • 18
    • 78149261517 scopus 로고    scopus 로고
    • FGb: A library for computing gröbner bases
    • Fukuda, K., Hoeven, J., Joswig, M., Takayama, N. (eds., Springer, Heidelberg
    • Faug̀ere, J.-C.: FGb: A Library for Computing Gröbner Bases. In: Fukuda, K., Hoeven, J., Joswig, M., Takayama, N. (eds.) ICMS 2010. LNCS, vol. 6327, pp. 84-87. Springer, Heidelberg (2010), http://www-salsa.lip6.fr/ ~jcf/Papers/ICMS.pdf
    • (2010) ICMS 2010. LNCS , vol.6327 , pp. 84-87
    • Faug̀ere, J.-C.1
  • 20
    • 51849145057 scopus 로고    scopus 로고
    • Cryptanalysis of MinRank
    • Wagner, D. (ed.), Springer, Heidelberg
    • Faug̀ere, J.-C., Levy-dit-Vehel, F., Perret, L.: Cryptanalysis of MinRank. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 280-296. Springer, Heidelberg (2008)
    • (2008) CRYPTO 2008. LNCS , vol.5157 , pp. 280-296
    • Faug̀ere, J.-C.1    Levy-Dit-Vehel, F.2    Perret, L.3
  • 22
    • 79952502319 scopus 로고    scopus 로고
    • Gröbner bases of bihomogeneous ideals generated by polynomials of bidegree (1,1): Algorithms and complexity
    • Faug̀ere, J.C., Safey El Din, M., Spaenlehauer, P.J.: Gröbner Bases of Bihomogeneous Ideals Generated by Polynomials of Bidegree (1,1): Algorithms and Complexity. Journal of Symbolic Computation, 1-39 (2010)
    • (2010) Journal of Symbolic Computation , pp. 1-39
    • Faug̀ere, J.C.1    Safey El Din, M.2    Spaenlehauer, P.J.3
  • 25
    • 54249088990 scopus 로고    scopus 로고
    • Kipnis-Shamir attack on HFE revisited
    • Pei, D., Yung, M., Lin, D., Wu, C. (eds., Springer, Heidelberg
    • Jiang, X., Ding, J., Hu, L.: Kipnis-Shamir attack on HFE revisited. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt 2007. LNCS, vol. 4990, pp. 399-411. Springer, Heidelberg (2008)
    • (2008) Inscrypt 2007. LNCS , vol.4990 , pp. 399-411
    • Jiang, X.1    Ding, J.2    Hu, L.3
  • 26
    • 84957060922 scopus 로고    scopus 로고
    • Cryptanalysis of the HFE public key cryptosystem by relinearization
    • Wiener, M. (ed.), Springer, Heidelberg
    • Kipnis, A., Shamir, A.: Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 19-30. Springer, Heidelberg (1999)
    • (1999) CRYPTO 1999. LNCS , vol.1666 , pp. 19-30
    • Kipnis, A.1    Shamir, A.2
  • 27
    • 85033537496 scopus 로고
    • Public quadratic polynomial-tuples for efficient signatureverification and message-encryption
    • Günther, C.G. (ed.), Springer, Heidelberg
    • Matsumoto, T., Imai, H.: Public quadratic polynomial-tuples for efficient signatureverification and message-encryption. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 419-453. Springer, Heidelberg (1988)
    • (1988) EUROCRYPT 1988. LNCS , vol.330 , pp. 419-453
    • Matsumoto, T.1    Imai, H.2
  • 28
    • 84957640013 scopus 로고
    • Cryptoanalysis of the matsumoto and imai public key scheme of eurocrypt 1988
    • Coppersmith, D. (ed.), Springer, Heidelberg
    • Patarin, J.: Cryptoanalysis of the Matsumoto and Imai public key scheme of Eurocrypt 1988. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 248-261. Springer, Heidelberg (1995)
    • (1995) CRYPTO 1995. LNCS , vol.963 , pp. 248-261
    • Patarin, J.1
  • 29
    • 84947932132 scopus 로고    scopus 로고
    • Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms
    • Patarin, J.: Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of asymmetric algorithms. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 33-48. Springer, Heidelberg (1996) (Pubitemid 126071052)
    • (1996) Lecture Notes in Computer Science , Issue.1070 , pp. 33-48
    • Patarin, J.1
  • 30
    • 33646202913 scopus 로고    scopus 로고
    • Equivalent keys in HFE, C *, and variations
    • Dawson, E., Vaudenay, S. (eds., Springer, Heidelberg
    • Wolf, C., Preneel, B.: Equivalent keys in HFE, C *, and variations. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 33-49. Springer, Heidelberg (2005)
    • (2005) Mycrypt 2005. LNCS , vol.3715 , pp. 33-49
    • Wolf, C.1    Preneel, B.2
  • 31
    • 24144456530 scopus 로고    scopus 로고
    • Large superfluous keys in multivariate quadratic asymmetric systems
    • Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
    • Wolf, C., Preneel, B.: Large superfluous keys in multivariate quadratic asymmetric systems. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 275-287. Springer, Heidelberg (2005) (Pubitemid 41231337)
    • (2005) Lecture Notes in Computer Science , vol.3386 , pp. 275-287
    • Wolf, C.1    Preneel, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.