The following pages link to (Q3374924):
Displaying 50 items.
- Solving degree, last fall degree, and related invariants (Q2156375) (← links)
- Practical post-quantum signature schemes from isomorphism problems of trilinear forms (Q2170103) (← links)
- Probabilistic analysis on Macaulay matrices over finite fields and complexity of constructing Gröbner bases (Q2204858) (← links)
- On the efficiency of solving Boolean polynomial systems with the characteristic set method (Q2211189) (← links)
- On the termination of the general XL algorithm and ordinary multinomials (Q2229702) (← links)
- Solving multivariate polynomial systems and an invariant from commutative algebra (Q2232206) (← links)
- An improved degree evaluation method of NFSR-based cryptosystems (Q2243894) (← links)
- Fast correlation attack on stream cipher ABC v3 (Q2250730) (← links)
- A new encryption scheme for multivariate quadratic systems (Q2290641) (← links)
- Overdetermined systems of sparse polynomial equations (Q2340503) (← links)
- A new signature-based algorithms for computing Gröbner bases (Q2341616) (← links)
- Cryptanalysis of a noncommutative key exchange protocol (Q2346714) (← links)
- Partition a quantum pure-state set into unambiguously discriminable subsets (Q2352559) (← links)
- Applying cube attacks to stream ciphers in realistic scenarios (Q2376659) (← links)
- Enhanced matrix power function for cryptographic primitive construction (Q2415047) (← links)
- Sparse Boolean equations and circuit lattices (Q2430703) (← links)
- GVW algorithm over principal ideal domains (Q2440326) (← links)
- Designing against a class of algebraic attacks on symmetric block ciphers (Q2502176) (← links)
- Consensus networks over finite fields (Q2628411) (← links)
- Quantum security of grain-128/grain-128a stream cipher against HHL algorithm (Q2685655) (← links)
- The complexity of solving Weil restriction systems (Q2689195) (← links)
- Using small-scale quantum devices to solve algebraic equations (Q2690295) (← links)
- Cryptanalysis of \textsf{LRainbow}: the lifted rainbow signature scheme (Q2697927) (← links)
- On Dynamical Systems of Large Girth or Cycle Indicator and Their Applications to Multivariate Cryptography (Q2866111) (← links)
- The Cryptographic Power of Random Selection (Q2889867) (← links)
- Computation with Polynomial Equations and Inequalities Arising in Combinatorial Optimization (Q2897307) (← links)
- Computing border bases using mutant strategies (Q2940363) (← links)
- From 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based Signatures (Q2953775) (← links)
- Revisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter Bounds (Q2980848) (← links)
- Algebraic Attacks on the Courtois Toy Cipher (Q3007784) (← links)
- A Variant of the F4 Algorithm (Q3073717) (← links)
- Hill Climbing Algorithms and Trivium (Q3084244) (← links)
- General Fault Attacks on Multivariate Public Key Cryptosystems (Q3102780) (← links)
- The Shortest Signatures Ever (Q3179477) (← links)
- Implicit Quadratic Property of Differentially 4-Uniform Permutations (Q3179495) (← links)
- Fast computation of a rational point of a variety over a finite field (Q3420246) (← links)
- Evaluation of Solving Time for Multivariate Quadratic Equation System Using XL Algorithm Over Small Finite Fields on GPU (Q3449432) (← links)
- A new framework for computing Gröbner bases (Q3450045) (← links)
- Cryptanalysis of the TRMS Signature Scheme of PKC’05 (Q3506376) (← links)
- New Differential-Algebraic Attacks and Reparametrization of Rainbow (Q3506411) (← links)
- On Cryptographically Significant Mappings over GF(2 n ) (Q3519562) (← links)
- Algebraic and Slide Attacks on KeeLoq (Q3525663) (← links)
- Differential Fault Analysis of Trivium (Q3525669) (← links)
- Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator (Q3525677) (← links)
- Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ℓIC-Derivatives (Q3535354) (← links)
- Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems (Q3535359) (← links)
- Secure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$ (Q3535361) (← links)
- MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy (Q3535362) (← links)
- A Five-Round Algebraic Property of the Advanced Encryption Standard (Q3540154) (← links)
- Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects (Q3593087) (← links)