-
1
-
-
84860002294
-
Asymptotic behaviour of the degree of regularity of semi-regular systems of equations
-
M. Bardet, J.-C. Faugère, B. Salvy, and B.-Y. Yang Asymptotic behaviour of the degree of regularity of semi-regular systems of equations Mega 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry 2005 1 14
-
(2005)
Mega 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry
, pp. 1-14
-
-
Bardet, M.1
Faugère, J.-C.2
Salvy, B.3
Yang, B.-Y.4
-
2
-
-
79952495417
-
Cryptanalysis of multivariate and odd-characteristic HFE variants
-
D. Catalano, N. Fazio, R. Gennaro, A. Nicolosi, PKC 2011 Lect. Notes Comput. Sci. Springer Berlin
-
L. Bettale, J.-C. Faugère, and L. Perret Cryptanalysis of multivariate and odd-characteristic HFE variants D. Catalano, N. Fazio, R. Gennaro, A. Nicolosi, Public Key Cryptography PKC 2011 Lect. Notes Comput. Sci. vol. 6571 2011 Springer Berlin 441 458
-
(2011)
Public Key Cryptography
, vol.6571 VOL.
, pp. 441-458
-
-
Bettale, L.1
Faugère, J.-C.2
Perret, L.3
-
3
-
-
84879688211
-
Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic
-
L. Bettale, J.-C. Faugère, and L. Perret Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic Des. Codes Cryptogr. 69 2012 1 52
-
(2012)
Des. Codes Cryptogr.
, vol.69
, pp. 1-52
-
-
Bettale, L.1
Faugère, J.-C.2
Perret, L.3
-
4
-
-
33746684290
-
A zero-dimensional Gröbner basis for AES-128
-
Lect. Notes Comput. Sci.
-
J. Buchmann, A. Pyshkin, and R.-P. Weinmann A zero-dimensional Gröbner basis for AES-128 FSE 2006 Lect. Notes Comput. Sci. vol. 4047 2006 78 88
-
(2006)
FSE 2006
, vol.4047 VOL.
, pp. 78-88
-
-
Buchmann, J.1
Pyshkin, A.2
Weinmann, R.-P.3
-
5
-
-
84972519550
-
Representations by quadratic forms in a finite field
-
L. Carlitz Representations by quadratic forms in a finite field Duke Math. J. 21 1954 123 137
-
(1954)
Duke Math. J.
, vol.21
, pp. 123-137
-
-
Carlitz, L.1
-
6
-
-
80051965157
-
Inverting the HFE systems is quasipolynomial for all fields
-
Crypto 2011 Lect. Notes Comput. Sci. Springer Berlin
-
J. Ding, and T.J. Hodges Inverting the HFE systems is quasipolynomial for all fields Advances in Cryptology Crypto 2011 Lect. Notes Comput. Sci. vol. 6841 2011 Springer Berlin 724 742
-
(2011)
Advances in Cryptology
, vol.6841 VOL.
, pp. 724-742
-
-
Ding, J.1
Hodges, T.J.2
-
8
-
-
77956272212
-
Computing loci of rank defects of linear matrices using Gröbner bases and applications to cryptology
-
J.-C. Faugère, Mohab Safey El Din, and Pierre-Jean Spaenlehauer Computing loci of rank defects of linear matrices using Gröbner bases and applications to cryptology ISSAC 2010 2010 257 264
-
(2010)
ISSAC 2010
, pp. 257-264
-
-
Faugère, J.-C.1
Safey El Din, M.2
Spaenlehauer, P.-J.3
-
11
-
-
0033143274
-
A new efficient algorithm for computing Gröbner bases (F4)
-
J.-C. Faugère A new efficient algorithm for computing Gröbner bases (F4) J. Pure Appl. Algebra 139 1999 61 89
-
(1999)
J. Pure Appl. Algebra
, vol.139
, pp. 61-89
-
-
Faugère, J.-C.1
-
13
-
-
25944479355
-
Efficient computation of zero-dimensional Gröbner bases by change of ordering
-
J.-C. Faugère, Patrizia M. Gianni, Daniel Lazard, and Teo Mora Efficient computation of zero-dimensional Gröbner bases by change of ordering J. Symb. Comput. 16 1993 329 344
-
(1993)
J. Symb. Comput.
, vol.16
, pp. 329-344
-
-
Faugère, J.-C.1
Gianni, P.M.2
Lazard, D.3
Mora, T.4
-
15
-
-
84860003880
-
Improving the complexity of index calculus algorithms in elliptic curves over binary fields
-
Lect. Notes Comput. Sci.
-
J.-C. Faugère, Ludovic Perret, Christophe Petit, and Guenael Renault Improving the complexity of index calculus algorithms in elliptic curves over binary fields EUROCRYPT 2012 Lect. Notes Comput. Sci. vol. 7237 2012 27 44
-
(2012)
EUROCRYPT 2012
, vol.7237 VOL.
, pp. 27-44
-
-
Faugère, J.-C.1
Perret, L.2
Petit, C.3
Renault, G.4
-
16
-
-
33749551989
-
Inverting HFE is quasi-polynomial
-
C. Dwork, CRYPTO 2006 Lect. Notes Comput. Sci. Springer Berlin
-
L. Granboulan, A. Joux, and J. Stern Inverting HFE is quasi-polynomial C. Dwork, Advances in Cryptology CRYPTO 2006 Lect. Notes Comput. Sci. vol. 4117 2006 Springer Berlin 345 356
-
(2006)
Advances in Cryptology
, vol.4117 VOL.
, pp. 345-356
-
-
Granboulan, L.1
Joux, A.2
Stern, J.3
-
17
-
-
84866342363
-
The degree of regularity of a quadratic polynomial
-
T.J. Hodges, and J. Schlather The degree of regularity of a quadratic polynomial J. Pure Appl. Algebra 217 2013 207 217
-
(2013)
J. Pure Appl. Algebra
, vol.217
, pp. 207-217
-
-
Hodges, T.J.1
Schlather, J.2
-
19
-
-
84947932132
-
Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms
-
J. Patarin Hidden field equations and isomorphism of polynomials (IP): two new families of asymmetric algorithms U. Maurer, Eurocrypt '96 Lect. Notes Comput. Sci. vol. 1070 1996 Springer Berlin 33 48 (Pubitemid 126071052)
-
(1996)
Lecture Notes In Computer Science
, Issue.1070
, pp. 33-48
-
-
Patarin, J.1
-
20
-
-
0010537086
-
Asymmetric cryptography with Sboxes
-
Beijing, China Lect. Notes Comput. Sci.
-
J. Patarin, and L. Goubin Asymmetric cryptography with Sboxes Proc. ICICS'97 Beijing, China Lect. Notes Comput. Sci. vol. 1334 1997 369 380
-
(1997)
Proc. ICICS'97
, vol.1334 VOL.
, pp. 369-380
-
-
Patarin, J.1
Goubin, L.2
-
21
-
-
0342430954
-
Trapdoor one-way permutations and multivariate polynomials
-
J. Patarin, and L. Goubin Trapdoor one-way permutations and multivariate polynomials Proc. ICICS'97 Beijing, China Lect. Notes Comput. Sci. vol. 1334 1997 356 368 (Pubitemid 127148063)
-
(1997)
Lecture Notes In Computer Science
, Issue.1334
, pp. 356-368
-
-
Patarin, J.1
Goubin, L.2
-
22
-
-
84871537002
-
On polynomial systems arising from a Weil descent
-
X. Wang, K. Sako, Lect. Notes Comput. Sci.
-
Christophe Petit, and Jean-Jacques Quisquater On polynomial systems arising from a Weil descent X. Wang, K. Sako, ASIACRYPT 2012 Lect. Notes Comput. Sci. vol. 7658 2012 451 466
-
(2012)
ASIACRYPT 2012
, vol.7658 VOL.
, pp. 451-466
-
-
Petit, C.1
Quisquater, J.-J.2
-
24
-
-
84893355052
-
F 5 for generic MQ with number of equations linear in that of variables
-
TU Darmstadt, Germany, November 21-22, 2013 Lect. Notes Comput. Sci.
-
F 5 for generic MQ with number of equations linear in that of variables Number Theory and Cryptography Workshop TU Darmstadt, Germany, November 21-22, 2013 Lect. Notes Comput. Sci. vol. 8260 2013 19 33
-
(2013)
Number Theory and Cryptography Workshop
, vol.8260 VOL.
, pp. 19-33
-
-
Yeh, J.Y.-C.1
Cheng, C.-M.2
Yang, B.-Y.3
-
25
-
-
77957112474
-
Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round
-
X. Zhao, and D. Feng Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round IET Inf. Secur. 4 3 September 2010 167 184
-
(2010)
IET Inf. Secur.
, vol.4
, Issue.3
, pp. 167-184
-
-
Zhao, X.1
Feng, D.2
|