Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3374924

zbMath1082.94514MaRDI QIDQ3374924

Nicolas T. Courtois, Alexander Klimov, Jacques Patarin, Adi Shamir

Publication date: 1 March 2006


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.


Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).


Related Items (only showing first 100 items - show all)

A Structural Attack on Block-Anti-Circulant UOV at SAC 2019Generalization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key EncryptionSemi-Regular Sequences and Other Random Systems of EquationsA New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOVA multivariate identity-based broadcast encryption with applications to the Internet of ThingsAn algorithm for solving over-determined multivariate quadratic systems over finite fieldsA new algebraic approach to the regular syndrome decoding problem and implications for PCG constructionsFUTURE: a lightweight block cipher using an optimal diffusion matrixAn estimator for the hardness of the MQ problemBreaking rainbow takes a weekend on a laptopImproving support-minors rank attacks: applications to G\textit{e}MSS and RainbowWorst-case subexponential attacks on PRGs of constant degree or constant localityDevelopment of hybrid approach for solving MQ problem: Intermediate hybrid approachTake your MEDS: digital signatures from matrix code equivalenceAlgebraic attacks on Rasta and Dasta using low-degree equationsOn the complexity of solving generic overdetermined bilinear systemsA new fault attack on UOV multivariate signature schemeIPRainbow2F -- a new method for constructing efficient multivariate encryption schemesAlgebraic relation of three MinRank algebraic modelingsAlgebraic Attacks against Random Local Functions and Their CountermeasuresA Cryptanalysis of the Double-Round Quadratic CryptosystemSide Channel Attacks on Irregularly Decimated GeneratorsAnalysis of Multivariate Hash FunctionsA Polyhedral Characterization of Border BasesKipnis-Shamir Attack on HFE RevisitedSequences, DFT and Resistance against Fast Algebraic AttacksOn the Number of Linearly Independent Equations Generated by XLThe Hidden Root ProblemAlgebraic Cryptanalysis of the Data Encryption StandardNew Description of SMS4 by an Embedding overGF(28)Cube Attacks on Tweakable Black Box PolynomialsA Highly Scalable RFID Authentication ProtocolUnnamed ItemUnnamed ItemSpecific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known PlaintextsAn Evolutionary Approach to the Automatic Classification of Automorphisms of Lower-Dimensional Lie AlgebrasMulti-round Secure Light-Weight Broadcast Exclusion Protocol with Pre-processingQuantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystemsOn multivariable encryption schemes based on simultaneous algebraic Riccati equations over finite fieldsStream/block ciphers, difference equations and algebraic attacksStronger bounds on the cost of computing Gröbner bases for HFE systemsSoK: how (not) to design and implement post-quantum cryptographyThe Cryptographic Power of Random Selection(Short paper) Simple matrix signature schemeMaxMinMax problem and sparse equations over finite fieldsBoolean ring cryptographic equation solvingAn application of algebraic geometry to encryption: tame transformation methodComputation with Polynomial Equations and Inequalities Arising in Combinatorial OptimizationEvaluation of Solving Time for Multivariate Quadratic Equation System Using XL Algorithm Over Small Finite Fields on GPUConsensus networks over finite fieldsA new framework for computing Gröbner basesApplying cube attacks to stream ciphers in realistic scenariosOn the reduction of multivariate quadratic systems to best rank-1 approximation of three-way tensorsThe Shortest Signatures EverImplicit Quadratic Property of Differentially 4-Uniform PermutationsOn implementing the symbolic preprocessing function over Boolean polynomial rings in Gröbner basis algorithms using linear algebraSolving degree, last fall degree, and related invariantsPractical post-quantum signature schemes from isomorphism problems of trilinear formsAlgebraic attacks on a class of stream ciphers with unknown output functionComputing border bases using mutant strategiesEnhanced matrix power function for cryptographic primitive constructionOn the geometry of balls in the Grassmannian and list decoding of lifted Gabidulin codesFrom 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based SignaturesMultivariate public key cryptosystems from Diophantine equationsOn the last fall degree of zero-dimensional Weil descent systemsResultant elimination via implicit equation interpolationCryptanalysis of the TRMS Signature Scheme of PKC’05New Differential-Algebraic Attacks and Reparametrization of RainbowCharacteristic set algorithms for equation solving in finite fieldsOn the relation between the MXL family of algorithms and Gröbner basis algorithmsExtended multivariate public key cryptosystems with secure encryption functionQuantum security of grain-128/grain-128a stream cipher against HHL algorithmThe complexity of solving Weil restriction systemsUsing small-scale quantum devices to solve algebraic equationsSparse Boolean equations and circuit latticesOn Cryptographically Significant Mappings over GF(2 n )Probabilistic analysis on Macaulay matrices over finite fields and complexity of constructing Gröbner basesCryptanalysis of \textsf{LRainbow}: the lifted rainbow signature schemeAlgebraic and Slide Attacks on KeeLoqDifferential Fault Analysis of TriviumGuess-and-Determine Algebraic Attack on the Self-Shrinking GeneratorGVW algorithm over principal ideal domainsOn the efficiency of solving Boolean polynomial systems with the characteristic set methodRevisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter BoundsPractical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ℓIC-DerivativesNonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key CryptosystemsSecure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant StrategyPSP: parallel sub-pipelined architecture for high throughput AES on FPGA and ASICA Five-Round Algebraic Property of the Advanced Encryption StandardA polynomial-time algorithm to compute generalized Hermite normal forms of matrices over \(\mathbb{Z} [x\)] ⋮ Speeding up the GVW algorithm via a substituting methodFlatness and structural analysis as a constructive framework for private communicationOn the termination of the general XL algorithm and ordinary multinomialsSolving multivariate polynomial systems and an invariant from commutative algebraAlgebraic cryptanalysis of stream ciphers using decomposition of Boolean functionAlgebraic Attacks on the Courtois Toy CipherEspresso: a stream cipher for 5G wireless communication systemsAn improved degree evaluation method of NFSR-based cryptosystems


Uses Software



This page was built for publication: