-
2
-
-
67650110016
-
-
Technical report, INRIA
-
Bardet, M., Faugère, J.-C., Salvy, B.: Complexity study of Gröbner basis computation. Technical report, INRIA (2002), http://www.inria.fr/rrrt/rr-5049.html
-
(2002)
Complexity Study of Gröbner Basis Computation
-
-
Bardet, M.1
Faugère, J.-C.2
Salvy, B.3
-
3
-
-
33746062308
-
On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations
-
Bardet, M., Faugère, J.-C., Salvy, B.: On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations. In: Proc. International Conference on Polynomial System Solving (ICPSS), pp. 71-75 (2004)
-
(2004)
Proc. International Conference on Polynomial System Solving (ICPSS)
, pp. 71-75
-
-
Bardet, M.1
Faugère, J.-C.2
Salvy, B.3
-
4
-
-
84860002294
-
Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems
-
Bardet, M., Faugère, J.-C., Salvy, B., Yang, B.-Y.: Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems. In: Proc. of MEGA 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry (2005)
-
Proc. of MEGA 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry (2005)
-
-
Bardet, M.1
Faugère, J.-C.2
Salvy, B.3
Yang, B.-Y.4
-
7
-
-
78049343086
-
Hybrid approach for solving multivariate systems over finite fields
-
Bettale, L., Faugère, J.-C., Perret, L.: Hybrid approach for solving multivariate systems over finite fields. Journal of Mathematical Cryptology 3(3), 177-197 (2009)
-
(2009)
Journal of Mathematical Cryptology
, vol.3
, Issue.3
, pp. 177-197
-
-
Bettale, L.1
Faugère, J.-C.2
Perret, L.3
-
8
-
-
79952495417
-
Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
-
Bettale, L., Faugère, J.-C., Perret, L.: Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 441-458. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6571
, pp. 441-458
-
-
Bettale, L.1
Faugère, J.-C.2
Perret, L.3
-
9
-
-
79952514770
-
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
-
Bouillaguet, C., Faugère, J.-C., Fouque, P.-A., Perret, L.: Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 473-493. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6571
, pp. 473-493
-
-
Bouillaguet, C.1
Faugère, J.-C.2
Fouque, P.-A.3
Perret, L.4
-
10
-
-
78651081301
-
Multivariate quadratic quasigroups (MQQs): Construction, bounds and complexity
-
Science Press of China October
-
Chen, Y., Knapskog, S.J., Gligoroski, D.: Multivariate quadratic quasigroups (MQQs): Construction, bounds and complexity. In: Inscrypt, 6th International Conference on Information Security and Cryptology. Science Press of China (October 2010)
-
(2010)
Inscrypt, 6th International Conference on Information Security and Cryptology
-
-
Chen, Y.1
Knapskog, S.J.2
Gligoroski, D.3
-
13
-
-
38049058300
-
Invertible Cycles for Ultivariate Uadratic (q) Public Key Cryptography
-
Okamoto, T., Wang, X. (eds.) PKC 2007. Springer, Heidelberg
-
Ding, J., Wolf, C., Yang, B.-Y.: -Invertible Cycles for Ultivariate Uadratic (q) Public Key Cryptography. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 266-281. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4450
, pp. 266-281
-
-
Ding, J.1
Wolf, C.2
Yang, B.-Y.3
-
14
-
-
45749150774
-
New Differential-Algebraic Attacks and Reparametrization of Rainbow
-
Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. Springer, Heidelberg
-
Ding, J., Yang, B.-Y., Chen, C.-H.O., Chen, M.-S., Cheng, C.-M.: New Differential-Algebraic Attacks and Reparametrization of Rainbow. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 242-257. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5037
, pp. 242-257
-
-
Ding, J.1
Yang, B.-Y.2
Chen, C.-H.O.3
Chen, M.-S.4
Cheng, C.-M.5
-
15
-
-
25944479355
-
Efficient computation of zerodimensional Gröbner bases by change of ordering
-
Faugère, J.C., Gianni, P., Lazard, D., Mora, T.: Efficient computation of zerodimensional Gröbner bases by change of ordering. J. Symb. Comput. 16, 329-344 (1993)
-
(1993)
J. Symb. Comput.
, vol.16
, pp. 329-344
-
-
Faugère, J.C.1
Gianni, P.2
Lazard, D.3
Mora, T.4
-
17
-
-
78651082594
-
Analysis of the MQQ Public Key Cryptosystem
-
Heng, S.-H., Wright, R.N., Goi, B.-M. (eds.) CANS 2010. Springer, Heidelberg
-
Faugère, J.-C., Ødegård, R.S., Perret, L., Gligoroski, D.: Analysis of the MQQ Public Key Cryptosystem. In: Heng, S.-H., Wright, R.N., Goi, B.-M. (eds.) CANS 2010. LNCS, vol. 6467, pp. 169-183. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6467
, pp. 169-183
-
-
Faugère, J.-C.1
Ødegård, R.S.2
Perret, L.3
Gligoroski, D.4
-
18
-
-
33746050364
-
Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
-
Faugère, J.-C., Perret, L.: Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 30-47. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 30-47
-
-
Faugère, J.-C.1
Perret, L.2
-
19
-
-
24944454273
-
Differential Cryptanalysis for Multivariate Schemes
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Fouque, P.-A., Granboulan, L., Stern, J.: Differential Cryptanalysis for Multivariate Schemes. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 341-353. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 341-353
-
-
Fouque, P.-A.1
Granboulan, L.2
Stern, J.3
-
21
-
-
84958958667
-
Public key block cipher based on multivariate quadratic quasigroups
-
ePrint Archive, Report 2008/320
-
Gligoroski, D., Markovski, S., Knapskog, S.J.: Public key block cipher based on multivariate quadratic quasigroups. Cryptology ePrint Archive, Report 2008/320
-
Cryptology
-
-
Gligoroski, D.1
Markovski, S.2
Knapskog, S.J.3
-
22
-
-
78650603590
-
Multivariate quadratic trapdoor functions based on multivariate quadratic quasigroups
-
World Scientific and Engineering Academy and Society (WSEAS), Stevens Point
-
Gligoroski, D., Markovski, S., Knapskog, S.J.: Multivariate quadratic trapdoor functions based on multivariate quadratic quasigroups. In: MATH 2008: Proceedings of the American Conference on Applied Mathematics, pp. 44-49. World Scientific and Engineering Academy and Society (WSEAS), Stevens Point (2008)
-
(2008)
MATH 2008: Proceedings of the American Conference on Applied Mathematics
, pp. 44-49
-
-
Gligoroski, D.1
Markovski, S.2
Knapskog, S.J.3
-
23
-
-
84937500998
-
Cryptanalysis of the TTM Cryptosystem
-
Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
-
Goubin, L., Courtois, N.T.: Cryptanalysis of the TTM Cryptosystem. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 44-57. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 44-57
-
-
Goubin, L.1
Courtois, N.T.2
-
24
-
-
84937500998
-
Cryptanalysis of the TTM Cryptosystem
-
Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
-
Goubin, L., Courtois, N.T., Schlumbergersema, C.: Cryptanalysis of the TTM Cryptosystem. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 44-57. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 44-57
-
-
Goubin, L.1
Courtois, N.T.2
Schlumbergersema, C.3
-
25
-
-
85022127411
-
Algebraic Methods for Constructing Asymmetric Cryptosystems
-
Calmet, J. (ed.) AAECC-3. Springer, Heidelberg
-
Imai, H., Matsumoto, T.: Algebraic Methods for Constructing Asymmetric Cryptosystems. In: Calmet, J. (ed.) AAECC-3. LNCS, vol. 229, pp. 108-119. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.229
, pp. 108-119
-
-
Imai, H.1
Matsumoto, T.2
-
26
-
-
0842267132
-
A construction of public key cryptosystem for realizing ciphertext of size 100 bit and digital signature scheme
-
Kasahara, M., Sakai, R.: A construction of public key cryptosystem for realizing ciphertext of size 100 bit and digital signature scheme. IEICE Transactions 87-A(1), 102-109 (2004)
-
(2004)
IEICE Transactions
, vol.87 A
, Issue.1
, pp. 102-109
-
-
Kasahara, M.1
Sakai, R.2
-
28
-
-
84957060922
-
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Kipnis, A., Shamir, A.: Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 19-30. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 19-30
-
-
Kipnis, A.1
Shamir, A.2
-
29
-
-
84968503742
-
Elliptic Curve Cryptosystems
-
Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation 48(177), 203-209 (1987)
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
31
-
-
85033537496
-
Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption
-
Günther, C.G. (ed.) EUROCRYPT 1988. Springer, Heidelberg
-
Matsumoto, T., Imai, H.: Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 419-453. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.330
, pp. 419-453
-
-
Matsumoto, T.1
Imai, H.2
-
32
-
-
85015402934
-
Use of Elliptic Curves in Cryptography
-
Williams, H.C. (ed.) CRYPTO 1985. Springer, Heidelberg
-
Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417-426. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
33
-
-
0033424342
-
A public key system with signature and master key functions
-
Moh, T.: A public key system with signature and master key functions. Communications in Algebra (1999)
-
(1999)
Communications in Algebra
-
-
Moh, T.1
-
35
-
-
71549124018
-
Algebraic Attack on the MQQ Public Key Cryptosystem
-
Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
-
Mohamed, M.S.E., Ding, J., Buchmann, J., Werner, F.: Algebraic Attack on the MQQ Public Key Cryptosystem. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 392-401. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5888
, pp. 392-401
-
-
Mohamed, M.S.E.1
Ding, J.2
Buchmann, J.3
Werner, F.4
-
36
-
-
24944519031
-
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
-
Maurer, U.M. (ed.) EUROCRYPT 1996. Springer, Heidelberg
-
Patarin, J.: Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 33-48. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 33-48
-
-
Patarin, J.1
-
37
-
-
0346111821
-
Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt 98
-
Patarin, J.: Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt 98. Des. Codes Cryptography 20, 175-209 (2000)
-
(2000)
Des. Codes Cryptography
, vol.20
, pp. 175-209
-
-
Patarin, J.1
-
38
-
-
24944522480
-
A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Perret, L.: A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 354-370. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 354-370
-
-
Perret, L.1
-
40
-
-
84865696339
-
Cyclicrainbow - A multivariate signature scheme with a partially cyclic public key based on rainbow
-
ePrint Archive, Report 2010/424
-
Petzoldt, A., Bulygin, S., Buchmann, J.: Cyclicrainbow - a multivariate signature scheme with a partially cyclic public key based on rainbow. Cryptology ePrint Archive, Report 2010/424 (2010), http://eprint.iacr.org/
-
(2010)
Cryptology
-
-
Petzoldt, A.1
Bulygin, S.2
Buchmann, J.3
-
41
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120-126 (1978)
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
43
-
-
84863042602
-
Construction of multivariate quadratic quasigroups (mqqs) in arbitrary galois fields
-
Samardjiska, S., Chen, Y., Gligoroski, D.: Construction of multivariate quadratic quasigroups (mqqs) in arbitrary galois fields. In: Proceedings of the International Conference on Information Assurance and Security (IAS) 2011, Malacca, Malaysia (2011)
-
Proceedings of the International Conference on Information Assurance and Security (IAS) 2011, Malacca, Malaysia (2011)
-
-
Samardjiska, S.1
Chen, Y.2
Gligoroski, D.3
-
44
-
-
85006080539
-
Efficient Signature Schemes Based on Birational Permutations
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Shamir, A.: Efficient Signature Schemes Based on Birational Permutations. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 1-12. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 1-12
-
-
Shamir, A.1
-
45
-
-
85006080539
-
Efficient Signature Schemes Based on Birational Permutations
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Shamir, A.: Efficient Signature Schemes Based on Birational Permutations. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 1-12. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 1-12
-
-
Shamir, A.1
-
46
-
-
84940287616
-
Public key cryptography using permutation p-polynomials over finite fields
-
ePrint Archive, Report 2009/208
-
Singh, R.P., Sarma, B.K., Saikia, A.: Public key cryptography using permutation p-polynomials over finite fields. Cryptology ePrint Archive, Report 2009/208 (2009), http://eprint.iacr.org/
-
(2009)
Cryptology
-
-
Singh, R.P.1
Sarma, B.K.2
Saikia, A.3
-
48
-
-
33747496018
-
On the security of stepwise triangular systems
-
Wolf, C., Braeken, A., Preneel, B.: On the security of stepwise triangular systems. Des. Codes Cryptography 40, 285-302 (2006)
-
(2006)
Des. Codes Cryptography
, vol.40
, pp. 285-302
-
-
Wolf, C.1
Braeken, A.2
Preneel, B.3
-
49
-
-
40249092492
-
Taxonomy of public key schemes based on the problem of multivariate quadratic equations
-
ePrint Archive, Report 2005/077
-
Wolf, C., Preneel, B.: Taxonomy of public key schemes based on the problem of multivariate quadratic equations. Cryptology ePrint Archive, Report 2005/077 (2005)
-
(2005)
Cryptology
-
-
Wolf, C.1
Preneel, B.2
-
50
-
-
26444593242
-
Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS
-
Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. Springer, Heidelberg
-
Yang, B.-Y., Chen, J.-M.: Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 518-531. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3574
, pp. 518-531
-
-
Yang, B.-Y.1
Chen, J.-M.2
-
51
-
-
33745816647
-
Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems
-
Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. Springer, Heidelberg
-
Yang, B.-Y., Cheng, C.-M., Chen, B.-R., Chen, J.-M.: Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 73-88. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3934
, pp. 73-88
-
-
Yang, B.-Y.1
Cheng, C.-M.2
Chen, B.-R.3
Chen, J.-M.4
|