-
1
-
-
82955184633
-
Polly cracker, revisited
-
D. Lee and X. Wang, editors, volume 7073 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg
-
M. Albrecht, J.-C. Faugère, P. Farshim, and L. Perret. Polly cracker, revisited. In D. Lee and X. Wang, editors, Advances in Cryptology Asiacrypt 2011, volume 7073 of Lecture Notes in Computer Science, pages 179-196. Springer Berlin/Heidelberg, 2011.
-
(2011)
Advances in Cryptology Asiacrypt 2011
, pp. 179-196
-
-
Albrecht, M.1
Faugère, J.-C.2
Farshim, P.3
Perret, L.4
-
2
-
-
35048863447
-
Comparison between xl and gröbner basis algorithms
-
P. J. Lee, editor, volume 3329 of Lecture Notes in Computer Science, Springer
-
G. Ars, J.-C. Faugère, H. Imai, M. Kawazoe, and M. Sugita. Comparison between xl and gröbner basis algorithms. In P. J. Lee, editor, ASIACRYPT, volume 3329 of Lecture Notes in Computer Science, pages 338-353. Springer, 2004.
-
(2004)
ASIACRYPT
, pp. 338-353
-
-
Ars, G.1
Faugère, J.-C.2
Imai, H.3
Kawazoe, M.4
Sugita, M.5
-
3
-
-
69949116022
-
Foreword
-
D. Augot, J.-C. Faugère, and L. Perret. Foreword. J. Symb. Comput., 44(12):1605-1607, 2009.
-
(2009)
J. Symb. Comput.
, vol.44
, Issue.12
, pp. 1605-1607
-
-
Augot, D.1
Faugère, J.-C.2
Perret, L.3
-
8
-
-
84860002294
-
Asymptotic behavior of the degree of regularity of semi-regular polynomial systems
-
M. Bardet, J.-C. Faugère, B. Salvy, and B.-Y. Yang. Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems. In The Effective Methods in Algebraic Geometry Conference - MEGA 2005, pages 1-14, 2005.
-
(2005)
The Effective Methods in Algebraic Geometry Conference - MEGA 2005
, pp. 1-14
-
-
Bardet, M.1
Faugère, J.-C.2
Salvy, B.3
Yang, B.-Y.4
-
9
-
-
78049343086
-
Hybrid approach for solving multivariate systems over finite fields
-
L. Bettale, J.-C. Faugère, and L. Perret. Hybrid approach for solving multivariate systems over finite fields. Journal of Mathematical Cryptology, volume 3(issue 3):177-197, 2009.
-
(2009)
Journal of Mathematical Cryptology
, vol.3
, Issue.3
, pp. 177-197
-
-
Bettale, L.1
Faugère, J.-C.2
Perret, L.3
-
10
-
-
78049336783
-
Fast exhaustive search for polynomial systems in f2
-
S. Mangard and F.-X. Standaert, editors, volume 6225 of Lecture Notes in Computer Science, Springer
-
C. Bouillaguet, H.-C. Chen, C.-M. Cheng, T. Chou, R. Niederhagen, A. Shamir, and B.-Y. Yang. Fast exhaustive search for polynomial systems in f2. In S. Mangard and F.-X. Standaert, editors, CHES, volume 6225 of Lecture Notes in Computer Science, pages 203-218. Springer, 2010.
-
(2010)
CHES
, pp. 203-218
-
-
Bouillaguet, C.1
Chen, H.-C.2
Cheng, C.-M.3
Chou, T.4
Niederhagen, R.5
Shamir, A.6
Yang, B.-Y.7
-
12
-
-
30944454253
-
An algorithm for finding the basis elements of the residue class ring of a zero dimensional polynomial ideal
-
Bruno buchberger's PHD thesis 1965
-
B. Buchberger. Bruno buchberger's phd thesis 1965: An algorithm for finding the basis elements of the residue class ring of a zero dimensional polynomial ideal. Journal of Symbolic Computation, 41(3-4):475-511, 2006.
-
(2006)
Journal of Symbolic Computation
, vol.41
, Issue.3-4
, pp. 475-511
-
-
Buchberger, B.1
-
13
-
-
84858654766
-
Computer algebra symbolic and algebraic computation
-
B. Buchberger, G. E. Collins, R. G. K. Loos, and R. Albrecht. Computer algebra symbolic and algebraic computation. SIGSAMBull., 16(4):5-5, 1982.
-
(1982)
SIGSAM Bull
, vol.16
, Issue.4
, pp. 5-5
-
-
Buchberger, B.1
Collins, G.E.2
Loos, R.G.K.3
Albrecht, R.4
-
16
-
-
84958765510
-
Cryptanalysis of block ciphers with over defined systems of equations
-
Y. Zheng, editor, volume 2501 of Lecture Notes in Computer Science, Springer
-
N. Courtois and J. Pieprzyk. Cryptanalysis of block ciphers with overdefined systems of equations. In Y. Zheng, editor, ASIACRYPT, volume 2501 of Lecture Notes in Computer Science, pages 267-287. Springer, 2002.
-
(2002)
ASIACRYPT
, pp. 267-287
-
-
Courtois, N.1
Pieprzyk, J.2
-
17
-
-
38149068190
-
Algebraic cryptanalysis of the data encryption standard
-
volume 4887 of Lecture Notes in Computer Science, Springer
-
N. T. Courtois and G. V. Bard. Algebraic cryptanalysis of the data encryption standard. In Cryptography and Coding '07, volume 4887 of Lecture Notes in Computer Science, pages 152-169. Springer, 2007.
-
(2007)
Cryptography and Coding '07
, pp. 152-169
-
-
Courtois, N.T.1
Bard, G.V.2
-
18
-
-
67650699727
-
Cube attacks on tweak able black box polynomials
-
A. Joux, editor, volume 5479 of Lecture Notes in Computer Science, Springer
-
I. Dinur and A. Shamir. Cube attacks on tweakable black box polynomials. In A. Joux, editor, EUROCRYPT, volume 5479 of Lecture Notes in Computer Science, pages 278-299. Springer, 2009.
-
(2009)
EUROCRYPT
, pp. 278-299
-
-
Dinur, I.1
Shamir, A.2
-
19
-
-
0033143274
-
A new efficient algorithm for computing Gröbner bases (F4)
-
June
-
J.-C. Faugère. A new efficient algorithm for computing Gröbner bases (F4). Journal of Pure and Applied Algebra, 139:61-88, June 1999.
-
(1999)
Journal of Pure and Applied Algebra
, vol.139
, pp. 61-88
-
-
Faugère, J.-C.1
-
21
-
-
51849145057
-
Cryptanalysis of minrank
-
D. Wagner, editor, volume 5157 of Lecture Notes in Computer Science, Springer
-
J.-C. Faugère, F. L. dit Vehel, and L. Perret. Cryptanalysis of minrank. In D. Wagner, editor, CRYPTO, volume 5157 of Lecture Notes in Computer Science, pages 280-296. Springer, 2008.
-
(2008)
CRYPTO
, pp. 280-296
-
-
Faugère, J.-C.1
Dit Vehel, F.L.2
Perret, L.3
-
22
-
-
25944479355
-
Efficient computation of zero-dimensional gröbner bases by change of ordering
-
J.-C. Faugère, P. M. Gianni, D. Lazard, and T. Mora. Efficient computation of zero-dimensional gröbner bases by change of ordering. J. Symb. Comput., 16(4):329-344, 1993.
-
(1993)
J. Symb. Comput.
, vol.16
, Issue.4
, pp. 329-344
-
-
Faugère, J.-C.1
Gianni, P.M.2
Lazard, D.3
Mora, T.4
-
23
-
-
35248840150
-
Algebraic cryptanalysis of Hidden Field Equation (HFE) cryptosystems using Gröbner bases
-
volume 2729 of Lecture Notes in Computer Science, Springer
-
J.-C. Faugère and A. Joux. Algebraic cryptanalysis of Hidden Field Equation (HFE) cryptosystems using Gröbner bases. In Advances in Cryptology - CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 44-60. Springer, 2003.
-
(2003)
Advances in Cryptology - CRYPTO 2003
, pp. 44-60
-
-
Faugère, J.-C.1
Joux, A.2
-
24
-
-
77954636190
-
Algebraic cryptanalysis of mceliece variants with compact keys
-
volume 6110 of Lecture Notes in Computer Science, Springer
-
J.-C. Faugère, A. Otmani, L. Perret, and J.-P. Tillich. Algebraic cryptanalysis of mceliece variants with compact keys. In Advances in Cryptology - EUROCRYPT 2010, volume 6110 of Lecture Notes in Computer Science, pages 279-298. Springer, 2010.
-
(2010)
Advances in Cryptology - EUROCRYPT 2010
, pp. 279-298
-
-
Faugère, J.-C.1
Otmani, A.2
Perret, L.3
Tillich, J.-P.4
-
25
-
-
84874982551
-
Improving the complexity of index calculus algorithms in elliptic curves over binary field
-
Lecture Notes in Computer Science, Springer Verlag
-
J.-C. Faugère, L. Perret, C. Petit, and G. Renault. Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Field. In Proceedings of Eurocrypt 2012, Lecture Notes in Computer Science, pages 1-15. Springer Verlag, 2012.
-
(2012)
Proceedings of Eurocrypt 2012
, pp. 1-15
-
-
Faugère, J.-C.1
Perret, L.2
Petit, C.3
Renault, G.4
-
26
-
-
0001511869
-
An inequality for Hilbert series of graded algebras
-
R. Fröberg. An inequality for Hilbert series of graded algebras. Math. Scand., 56(2):117-144, 1985.
-
(1985)
Math. Scand.
, vol.56
, Issue.2
, pp. 117-144
-
-
Fröberg, R.1
-
27
-
-
77956336230
-
A new incremental algorithm for computing groebner bases
-
W. Koepf, editor, ACM
-
S. Gao, Y. Guan, and F. Volny. A new incremental algorithm for computing groebner bases. In W. Koepf, editor, ISSAC, pages 13-19. ACM, 2010.
-
(2010)
ISSAC
, pp. 13-19
-
-
Gao, S.1
Guan, Y.2
Volny, F.3
-
29
-
-
84957693117
-
Unbalanced oil and vinegar signature schemes
-
volume 1592 of Lecture Notes in Computer Science, Springer
-
A. Kipnis, J. Patarin, and L. Goubin. Unbalanced oil and vinegar signature schemes. In Advances in Cryptology -EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, pages 206-222. Springer, 1999.
-
(1999)
Advances in Cryptology -EUROCRYPT '99
, pp. 206-222
-
-
Kipnis, A.1
Patarin, J.2
Goubin, L.3
-
30
-
-
84957060922
-
Cryptanalysis of the HFE Public Key cryptosystem by Relinearization
-
volume 1666 of Lecture Notes in Computer Science, Springer
-
A. Kipnis and A. Shamir. Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. In Advances in Cryptology - CRYPTO 99, volume 1666 of Lecture Notes in Computer Science, pages 19-30. Springer, 1999.
-
(1999)
Advances in Cryptology - CRYPTO 99
, pp. 19-30
-
-
Kipnis, A.1
Shamir, A.2
-
31
-
-
84957060922
-
Cryptanalysis of the HFE public key cryptosystem by Relinearization
-
M. J. Wiener, editor, volume 1666 of Lecture Notes in Computer Science, Springer
-
A. Kipnis and A. Shamir. Cryptanalysis of the hfe public key cryptosystem by relinearization. In M. J. Wiener, editor, CRYPTO, volume 1666 of Lecture Notes in Computer Science, pages 19-30. Springer, 1999.
-
(1999)
CRYPTO
, pp. 19-30
-
-
Kipnis, A.1
Shamir, A.2
-
32
-
-
85033537496
-
Public quadratic polynomial-tulles for efficient signature-verification and message-encryption
-
volume 330 of Lecture Notes in Computer Science, Springer
-
T. Matsumoto and H. Imai. Public quadratic polynomial-tuples for efficient signature-verification and message-encryption. In Advances in Cryptology -EUROCRYPT '88, volume 330 of Lecture Notes in Computer Science, pages 419-453. Springer, 1988.
-
(1988)
Advances in Cryptology -EUROCRYPT '88
, pp. 419-453
-
-
Matsumoto, T.1
Imai, H.2
-
33
-
-
84947932132
-
Hidden Fields Equations (HFE) and Isomorphism's of Polynomials (IP): Two new families of asymmetric algorithms
-
volume 1070 of Lecture Notes in Computer Science, Springer
-
J. Patarin. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of asymmetric algorithms. In Advances in Cryptology - EUROCRYPT '96, volume 1070 of Lecture Notes in Computer Science, pages 33-48. Springer, 1996.
-
(1996)
Advances in Cryptology - EUROCRYPT '96
, pp. 33-48
-
-
Patarin, J.1
-
34
-
-
80052001789
-
Public-key identification schemes based on multivariate quadratic polynomials
-
P. Rogaway, editor, volume 6841 of Lecture Notes in Computer Science, Springer
-
K. Sakumoto, T. Shirai, and H. Hiwatari. Public-key identification schemes based on multivariate quadratic polynomials. In P. Rogaway, editor, CRYPTO, volume 6841 of Lecture Notes in Computer Science, pages 706-723. Springer, 2011.
-
(2011)
CRYPTO
, pp. 706-723
-
-
Sakumoto, K.1
Shirai, T.2
Hiwatari, H.3
-
35
-
-
84892316200
-
-
Springer
-
M. Sala, T. Mora, L. Perret, S. Sakata, and C. Traverso. Gröbner Bases, Coding, and Cryptography. Springer, 2009.
-
(2009)
Gröbner Bases, Coding, and Cryptography
-
-
Sala, M.1
Mora, T.2
Perret, L.3
Sakata, S.4
Traverso, C.5
-
36
-
-
38349029413
-
Algebraic cryptanalysis of 58-round SHA-1
-
volume 4593 of Lecture Notes in Computer Science, Springer
-
M. Sugita, M. Kawazoe, L. Perret, and H. Imai. Algebraic cryptanalysis of 58-round SHA-1. In Fast Software Encryption, volume 4593 of Lecture Notes in Computer Science, pages 349-365. Springer, 2007.
-
(2007)
Fast Software Encryption
, pp. 349-365
-
-
Sugita, M.1
Kawazoe, M.2
Perret, L.3
Imai, H.4
-
37
-
-
40249092492
-
Taxonomy of public key schemes based on the problem of multivariate quadratic equations
-
C. Wolf and B. Preneel. Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations. Cryptology ePrint Archive, Report 2005/077, 2005. http://eprint.iacr.org/.
-
(2005)
Cryptology E-Print Archive, Report 2005/077
-
-
Wolf, C.1
Preneel, B.2
-
38
-
-
33646770907
-
Theoretical analysis of XL over small fields
-
H. Wang, J. Pieprzyk, and V. Varadharajan, editors, volume 3108 of Lecture Notes in Computer Science, Springer
-
B.-Y. Yang and J.-M. Chen. Theoretical analysis of xl over small fields. In H. Wang, J. Pieprzyk, and V. Varadharajan, editors, ACISP, volume 3108 of Lecture Notes in Computer Science, pages 277-288. Springer, 2004.
-
(2004)
ACISP
, pp. 277-288
-
-
Yang, B.-Y.1
Chen, J.-M.2
-
39
-
-
33646811417
-
On asymptotic security estimates in xl and gröbner bases-related algebraic cryptanalysis
-
J. Lopez, S. Qing, and E. Okamoto, editors, volume 3269 of Lecture Notes in Computer Science, Springer
-
B.-Y. Yang, J.-M. Chen, and N. Courtois. On asymptotic security estimates in xl and gröbner bases-related algebraic cryptanalysis. In J. Lopez, S. Qing, and E. Okamoto, editors, ICICS, volume 3269 of Lecture Notes in Computer Science, pages 401-413. Springer, 2004.
-
(2004)
ICICS
, pp. 401-413
-
-
Yang, B.-Y.1
Chen, J.-M.2
Courtois, N.3
|