scientific article
From MaRDI portal
Publication:3374924
zbMath1082.94514MaRDI QIDQ3374924
Nicolas T. Courtois, Alexander Klimov, Jacques Patarin, Adi Shamir
Publication date: 1 March 2006
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).
Related Items (only showing first 100 items - show all)
A Structural Attack on Block-Anti-Circulant UOV at SAC 2019 ⋮ Generalization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key Encryption ⋮ Semi-Regular Sequences and Other Random Systems of Equations ⋮ A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV ⋮ A multivariate identity-based broadcast encryption with applications to the Internet of Things ⋮ An algorithm for solving over-determined multivariate quadratic systems over finite fields ⋮ A new algebraic approach to the regular syndrome decoding problem and implications for PCG constructions ⋮ FUTURE: a lightweight block cipher using an optimal diffusion matrix ⋮ An estimator for the hardness of the MQ problem ⋮ Breaking rainbow takes a weekend on a laptop ⋮ Improving support-minors rank attacks: applications to G\textit{e}MSS and Rainbow ⋮ Worst-case subexponential attacks on PRGs of constant degree or constant locality ⋮ Development of hybrid approach for solving MQ problem: Intermediate hybrid approach ⋮ Take your MEDS: digital signatures from matrix code equivalence ⋮ Algebraic attacks on Rasta and Dasta using low-degree equations ⋮ On the complexity of solving generic overdetermined bilinear systems ⋮ A new fault attack on UOV multivariate signature scheme ⋮ IPRainbow ⋮ 2F -- a new method for constructing efficient multivariate encryption schemes ⋮ Algebraic relation of three MinRank algebraic modelings ⋮ Algebraic Attacks against Random Local Functions and Their Countermeasures ⋮ A Cryptanalysis of the Double-Round Quadratic Cryptosystem ⋮ Side Channel Attacks on Irregularly Decimated Generators ⋮ Analysis of Multivariate Hash Functions ⋮ A Polyhedral Characterization of Border Bases ⋮ Kipnis-Shamir Attack on HFE Revisited ⋮ Sequences, DFT and Resistance against Fast Algebraic Attacks ⋮ On the Number of Linearly Independent Equations Generated by XL ⋮ The Hidden Root Problem ⋮ Algebraic Cryptanalysis of the Data Encryption Standard ⋮ New Description of SMS4 by an Embedding overGF(28) ⋮ Cube Attacks on Tweakable Black Box Polynomials ⋮ A Highly Scalable RFID Authentication Protocol ⋮ Unnamed Item ⋮ Unnamed Item ⋮ Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts ⋮ An Evolutionary Approach to the Automatic Classification of Automorphisms of Lower-Dimensional Lie Algebras ⋮ Multi-round Secure Light-Weight Broadcast Exclusion Protocol with Pre-processing ⋮ Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystems ⋮ On multivariable encryption schemes based on simultaneous algebraic Riccati equations over finite fields ⋮ Stream/block ciphers, difference equations and algebraic attacks ⋮ Stronger bounds on the cost of computing Gröbner bases for HFE systems ⋮ SoK: how (not) to design and implement post-quantum cryptography ⋮ The Cryptographic Power of Random Selection ⋮ (Short paper) Simple matrix signature scheme ⋮ MaxMinMax problem and sparse equations over finite fields ⋮ Boolean ring cryptographic equation solving ⋮ An application of algebraic geometry to encryption: tame transformation method ⋮ Computation with Polynomial Equations and Inequalities Arising in Combinatorial Optimization ⋮ Evaluation of Solving Time for Multivariate Quadratic Equation System Using XL Algorithm Over Small Finite Fields on GPU ⋮ Consensus networks over finite fields ⋮ A new framework for computing Gröbner bases ⋮ Applying cube attacks to stream ciphers in realistic scenarios ⋮ On the reduction of multivariate quadratic systems to best rank-1 approximation of three-way tensors ⋮ The Shortest Signatures Ever ⋮ Implicit Quadratic Property of Differentially 4-Uniform Permutations ⋮ On implementing the symbolic preprocessing function over Boolean polynomial rings in Gröbner basis algorithms using linear algebra ⋮ Solving degree, last fall degree, and related invariants ⋮ Practical post-quantum signature schemes from isomorphism problems of trilinear forms ⋮ Algebraic attacks on a class of stream ciphers with unknown output function ⋮ Computing border bases using mutant strategies ⋮ Enhanced matrix power function for cryptographic primitive construction ⋮ On the geometry of balls in the Grassmannian and list decoding of lifted Gabidulin codes ⋮ From 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based Signatures ⋮ Multivariate public key cryptosystems from Diophantine equations ⋮ On the last fall degree of zero-dimensional Weil descent systems ⋮ Resultant elimination via implicit equation interpolation ⋮ Cryptanalysis of the TRMS Signature Scheme of PKC’05 ⋮ New Differential-Algebraic Attacks and Reparametrization of Rainbow ⋮ Characteristic set algorithms for equation solving in finite fields ⋮ On the relation between the MXL family of algorithms and Gröbner basis algorithms ⋮ Extended multivariate public key cryptosystems with secure encryption function ⋮ Quantum security of grain-128/grain-128a stream cipher against HHL algorithm ⋮ The complexity of solving Weil restriction systems ⋮ Using small-scale quantum devices to solve algebraic equations ⋮ Sparse Boolean equations and circuit lattices ⋮ On Cryptographically Significant Mappings over GF(2 n ) ⋮ Probabilistic analysis on Macaulay matrices over finite fields and complexity of constructing Gröbner bases ⋮ Cryptanalysis of \textsf{LRainbow}: the lifted rainbow signature scheme ⋮ Algebraic and Slide Attacks on KeeLoq ⋮ Differential Fault Analysis of Trivium ⋮ Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator ⋮ GVW algorithm over principal ideal domains ⋮ On the efficiency of solving Boolean polynomial systems with the characteristic set method ⋮ Revisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter Bounds ⋮ Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ℓIC-Derivatives ⋮ Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems ⋮ Secure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$ ⋮ MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy ⋮ PSP: parallel sub-pipelined architecture for high throughput AES on FPGA and ASIC ⋮ A Five-Round Algebraic Property of the Advanced Encryption Standard ⋮ A polynomial-time algorithm to compute generalized Hermite normal forms of matrices over \(\mathbb{Z} [x\)] ⋮ Speeding up the GVW algorithm via a substituting method ⋮ Flatness and structural analysis as a constructive framework for private communication ⋮ On the termination of the general XL algorithm and ordinary multinomials ⋮ Solving multivariate polynomial systems and an invariant from commutative algebra ⋮ Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function ⋮ Algebraic Attacks on the Courtois Toy Cipher ⋮ Espresso: a stream cipher for 5G wireless communication systems ⋮ An improved degree evaluation method of NFSR-based cryptosystems
Uses Software
This page was built for publication: