-
1
-
-
0003611980
-
An introduction to gröbner bases. Graduate studies in mahematics
-
Adams, W.W., Loustaunau, P.: An Introduction to Gröbner Bases. Graduate Studies in Mahematics, vol. 3. AMS, Providence (1994)
-
(1994)
AMS, Providence
, vol.3
-
-
Adams, W.W.1
Loustaunau, P.2
-
2
-
-
33746062308
-
On the complexity of gröbner basis computation of semi-regular overdetermined algebraic equations
-
Bardet, M., Faug̀ere, J.-C., Salvy, B.: On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations. In: Proc. International Conference on Polynomial System Solving (ICPSS), pp. 71-75 (2004)
-
(2004)
Proc. International Conference on Polynomial System Solving (ICPSS)
, pp. 71-75
-
-
Bardet, M.1
Faug̀ere, J.-C.2
Salvy, B.3
-
3
-
-
45449085776
-
Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems
-
Bardet, M., Faug̀ere, J.-C., Salvy, B., Yang, B.-Y.: Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems. In: Proc. of MEGA 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry (2005)
-
(2005)
Proc. of MEGA 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry
-
-
Bardet, M.1
Faug̀ere, J.-C.2
Salvy, B.3
Yang, B.-Y.4
-
4
-
-
78049343086
-
Hybrid approach for solving multivariate systems over finite fields
-
Bettale, L., Faug̀ere, J.-C., Perret, L.: Hybrid approach for solving multivariate systems over finite fields. Journal of Mathematical Cryptology, 177-197 (2009)
-
(2009)
Journal of Mathematical Cryptology
, pp. 177-197
-
-
Bettale, L.1
Faug̀ere, J.-C.2
Perret, L.3
-
6
-
-
51049092298
-
Time-area optimized publickey engines: MQ-cryptosystems as replacement for elliptic curves?
-
Oswald, E., Rohatgi, P. (eds., Springer, Heidelberg
-
Bogdanov, A., Eisenbarth, T., Rupp, A., Wolf, C.: Time-area optimized publickey engines: MQ-cryptosystems as replacement for elliptic curves? In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 45-61. Springer, Heidelberg (2008)
-
(2008)
CHES 2008. LNCS
, vol.5154
, pp. 45-61
-
-
Bogdanov, A.1
Eisenbarth, T.2
Rupp, A.3
Wolf, C.4
-
7
-
-
0031232428
-
The Magma algebra system I: The user language
-
Bosma, W., Cannon, J.J., Playoust, C.: The Magma algebra system I: The user language. Journal of Symbolic Computation 24(3-4), 235-265 (1997) (Pubitemid 127167874)
-
(1997)
Journal of Symbolic Computation
, vol.24
, Issue.3-4
, pp. 235-265
-
-
Bosma, W.1
Cannon, J.2
Playoust, C.3
-
10
-
-
70350604666
-
SSE implementation of multivariate PKCs on modern x86 CPUs
-
Clavier, C., Gaj, K. (eds., Springer, Heidelberg
-
Chen, A.I.-T., Chen, M.-S., Chen, T.-R., Cheng, C.-M., Ding, J., Kuo, E.L.-H., Lee, F.Y.-S., Yang, B.-Y.: SSE implementation of multivariate PKCs on modern x86 CPUs. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 33-48. Springer, Heidelberg (2009)
-
(2009)
CHES 2009. LNCS
, vol.5747
, pp. 33-48
-
-
Chen, A.I.-T.1
Chen, M.-S.2
Chen, T.-R.3
Cheng, C.-M.4
Ding, J.5
Kuo, E.L.-H.6
Lee, F.Y.-S.7
Yang, B.-Y.8
-
11
-
-
79952502318
-
Odd-char multivariate Hidden Field Equations
-
Chen, C.H.O., Chen, M.S., Ding, J., Werner, F., Yang, B.Y.: Odd-char multivariate Hidden Field Equations. Cryptology ePrint Archive (2008), http://eprint.iacr.org/2008/543
-
(2008)
Cryptology EPrint Archive
-
-
Chen, C.H.O.1
Chen, M.S.2
Ding, J.3
Werner, F.4
Yang, B.Y.5
-
12
-
-
84946828059
-
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
-
Advances in Cryptology - ASIACRYPT 2001
-
Courtois, N.T.: Efficient zero-knowledge authentication based on a linear algebra problem MinRank. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 402-421. Springer, Heidelberg (2001) (Pubitemid 33371198)
-
(2002)
Lecture Notes in Computer Science
, Issue.2248
, pp. 402-421
-
-
Courtois, N.T.1
-
13
-
-
0003908675
-
-
Springer, Heidelberg
-
Cox, D.A., Little, J.B., O'Shea, D.: Ideals, Varieties and Algorithms. Springer, Heidelberg (2005)
-
(2005)
Ideals Varieties and Algorithms
-
-
Cox, D.A.1
Little, J.B.2
O'Shea, D.3
-
14
-
-
56649111148
-
Algebraic attack on HFE revisited
-
Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds., Springer, Heidelberg
-
Ding, J., Schmidt, D., Werner, F.: Algebraic attack on HFE revisited. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 215-227. Springer, Heidelberg (2008)
-
(2008)
ISC 2008. LNCS
, vol.5222
, pp. 215-227
-
-
Ding, J.1
Schmidt, D.2
Werner, F.3
-
15
-
-
0033143274
-
A new efficient algorithm for computing Gröbner bases (F4)
-
Faug̀ere, J.-C.: A new efficient algorithm for computing Gröbner bases (F4). Journal of Pure and Applied Algebra 139, 61-88 (1999)
-
(1999)
Journal of Pure and Applied Algebra
, vol.139
, pp. 61-88
-
-
Faug̀ere, J.-C.1
-
17
-
-
33646827958
-
Algebraic cryptanalysis of HFE using Gröbner bases
-
Faug̀ere, J.-C.: Algebraic cryptanalysis of HFE using Gröbner bases. Reasearch report RR-4738, INRIA (2003), http://hal.inria.fr/inria- 00071849/PDF/RR-4738.pdf
-
(2003)
Reasearch Report RR-4738, INRIA
-
-
Faug̀ere, J.-C.1
-
18
-
-
78149261517
-
FGb: A library for computing gröbner bases
-
Fukuda, K., Hoeven, J., Joswig, M., Takayama, N. (eds., Springer, Heidelberg
-
Faug̀ere, J.-C.: FGb: A Library for Computing Gröbner Bases. In: Fukuda, K., Hoeven, J., Joswig, M., Takayama, N. (eds.) ICMS 2010. LNCS, vol. 6327, pp. 84-87. Springer, Heidelberg (2010), http://www-salsa.lip6.fr/ ~jcf/Papers/ICMS.pdf
-
(2010)
ICMS 2010. LNCS
, vol.6327
, pp. 84-87
-
-
Faug̀ere, J.-C.1
-
19
-
-
35248840150
-
Algebraic cryptanalysis of Hidden Field Equation (HFE) cryptosystems using Gröbner bases
-
Faug̀ere, J.-C., Joux, A.: Algebraic cryptanalysis of Hidden Field Equation (HFE) cryptosystems using Gröbner bases. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 44-60. Springer, Heidelberg (2003) (Pubitemid 137636934)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2729
, pp. 44-60
-
-
Faugere, J.-C.1
Joux, A.2
-
20
-
-
51849145057
-
Cryptanalysis of MinRank
-
Wagner, D. (ed.), Springer, Heidelberg
-
Faug̀ere, J.-C., Levy-dit-Vehel, F., Perret, L.: Cryptanalysis of MinRank. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 280-296. Springer, Heidelberg (2008)
-
(2008)
CRYPTO 2008. LNCS
, vol.5157
, pp. 280-296
-
-
Faug̀ere, J.-C.1
Levy-Dit-Vehel, F.2
Perret, L.3
-
22
-
-
79952502319
-
Gröbner bases of bihomogeneous ideals generated by polynomials of bidegree (1,1): Algorithms and complexity
-
Faug̀ere, J.C., Safey El Din, M., Spaenlehauer, P.J.: Gröbner Bases of Bihomogeneous Ideals Generated by Polynomials of Bidegree (1,1): Algorithms and Complexity. Journal of Symbolic Computation, 1-39 (2010)
-
(2010)
Journal of Symbolic Computation
, pp. 1-39
-
-
Faug̀ere, J.C.1
Safey El Din, M.2
Spaenlehauer, P.J.3
-
24
-
-
33749551989
-
Inverting HFE is quasipolynomial
-
Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
-
Granboulan, L., Joux, A., Stern, J.: Inverting HFE is quasipolynomial. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 345-356. Springer, Heidelberg (2006) (Pubitemid 44532125)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4117
, pp. 345-356
-
-
Granboulan, L.1
Joux, A.2
Stern, J.3
-
25
-
-
54249088990
-
Kipnis-Shamir attack on HFE revisited
-
Pei, D., Yung, M., Lin, D., Wu, C. (eds., Springer, Heidelberg
-
Jiang, X., Ding, J., Hu, L.: Kipnis-Shamir attack on HFE revisited. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt 2007. LNCS, vol. 4990, pp. 399-411. Springer, Heidelberg (2008)
-
(2008)
Inscrypt 2007. LNCS
, vol.4990
, pp. 399-411
-
-
Jiang, X.1
Ding, J.2
Hu, L.3
-
26
-
-
84957060922
-
Cryptanalysis of the HFE public key cryptosystem by relinearization
-
Wiener, M. (ed.), Springer, Heidelberg
-
Kipnis, A., Shamir, A.: Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 19-30. Springer, Heidelberg (1999)
-
(1999)
CRYPTO 1999. LNCS
, vol.1666
, pp. 19-30
-
-
Kipnis, A.1
Shamir, A.2
-
27
-
-
85033537496
-
Public quadratic polynomial-tuples for efficient signatureverification and message-encryption
-
Günther, C.G. (ed.), Springer, Heidelberg
-
Matsumoto, T., Imai, H.: Public quadratic polynomial-tuples for efficient signatureverification and message-encryption. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 419-453. Springer, Heidelberg (1988)
-
(1988)
EUROCRYPT 1988. LNCS
, vol.330
, pp. 419-453
-
-
Matsumoto, T.1
Imai, H.2
-
28
-
-
84957640013
-
Cryptoanalysis of the matsumoto and imai public key scheme of eurocrypt 1988
-
Coppersmith, D. (ed.), Springer, Heidelberg
-
Patarin, J.: Cryptoanalysis of the Matsumoto and Imai public key scheme of Eurocrypt 1988. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 248-261. Springer, Heidelberg (1995)
-
(1995)
CRYPTO 1995. LNCS
, vol.963
, pp. 248-261
-
-
Patarin, J.1
-
29
-
-
84947932132
-
Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms
-
Patarin, J.: Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of asymmetric algorithms. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 33-48. Springer, Heidelberg (1996) (Pubitemid 126071052)
-
(1996)
Lecture Notes in Computer Science
, Issue.1070
, pp. 33-48
-
-
Patarin, J.1
-
30
-
-
33646202913
-
Equivalent keys in HFE, C *, and variations
-
Dawson, E., Vaudenay, S. (eds., Springer, Heidelberg
-
Wolf, C., Preneel, B.: Equivalent keys in HFE, C *, and variations. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 33-49. Springer, Heidelberg (2005)
-
(2005)
Mycrypt 2005. LNCS
, vol.3715
, pp. 33-49
-
-
Wolf, C.1
Preneel, B.2
-
31
-
-
24144456530
-
Large superfluous keys in multivariate quadratic asymmetric systems
-
Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
-
Wolf, C., Preneel, B.: Large superfluous keys in multivariate quadratic asymmetric systems. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 275-287. Springer, Heidelberg (2005) (Pubitemid 41231337)
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 275-287
-
-
Wolf, C.1
Preneel, B.2
|