×

Found 102 Documents (Results 1–100)

The implementation and complexity analysis of the branch Gröbner bases algorithm over Boolean polynomial rings. (English) Zbl 1352.68302

Feng, Ruyong (ed.) et al., Computer mathematics. 9th Asian symposium, ASCM 2009, Fukuoka, Japan, December 14–17, 2009, 10th Asian symposium, ASCM 2012, Beijing, China, October 26–28, 2012. Contributed papers and invited talks. Berlin: Springer (ISBN 978-3-662-43798-8/hbk; 978-3-662-43799-5/ebook). 157-169 (2014).
PDFBibTeX XMLCite
Full Text: DOI

A practical attack on patched MIFARE Classic. (English) Zbl 1347.94028

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 150-164 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Symmetrized summation polynomials: using small order torsion points to speed up elliptic curve index calculus. (English) Zbl 1326.94092

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 40-57 (2014).
MSC:  94A60 14G50 11T71
PDFBibTeX XMLCite
Full Text: DOI

Solving polynomial systems over finite fields: improved analysis of the hybrid approach. (English) Zbl 1323.68583

van der Hoeven, Joris (ed.) et al., Proceedings of the 37th international symposium on symbolic and algebraic computation, ISSAC 2012, Grenoble, France, July 22–25, 2012. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1269-1). 67-74 (2012).
MSC:  68W30 11T06 11Y16
PDFBibTeX XMLCite
Full Text: DOI

Analysis of Trivium using compressed right hand side equations. (English) Zbl 1301.94128

Kim, Howon (ed.), Information security and cryptology – ICISC 2011. 14th international conference, Seoul, Korea, November 30–December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 18-32 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Public-key cryptography from new multivariate quadratic assumptions. (English) Zbl 1287.94073

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 190-205 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Solving underdetermined systems of multivariate quadratic equations revisited. (English) Zbl 1290.94134

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 156-171 (2012).
MSC:  94A60 11T71 68P25
PDFBibTeX XMLCite
Full Text: DOI

Improving the complexity of index calculus algorithms in elliptic curves over binary fields. (English) Zbl 1290.94070

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 27-44 (2012).
MSC:  94A60 11T71 14G50
PDFBibTeX XMLCite
Full Text: DOI

Breaking an identity-based encryption scheme based on DHIES. (English) Zbl 1291.94042

Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 344-355 (2011).
MSC:  94A60 13P10
PDFBibTeX XMLCite
Full Text: DOI

Inverting HFE systems is quasi-polynomial for all fields. (English) Zbl 1287.94064

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 724-742 (2011).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: DOI

Algebraic precomputations in differential and integral cryptanalysis. (English) Zbl 1295.94006

Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20–24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 387-403 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Algebraic techniques in differential cryptanalysis revisited. (English) Zbl 1295.94149

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 120-141 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Practical cryptanalysis of the identification scheme based on the isomorphism of polynomial with one secret problem. (English) Zbl 1291.94062

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 473-493 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of multivariate and odd-characteristic HFE variants. (English) Zbl 1291.94058

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 441-458 (2011).
MSC:  94A60 13P10
PDFBibTeX XMLCite
Full Text: DOI

Linear recurring sequences for the UOV key generation. (English) Zbl 1291.94141

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 335-350 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Computing loci of rank defects of linear matrices using Gröbner bases and applications to cryptology. (English) Zbl 1321.68529

Watt, Stephen M. (ed.), Proceedings of the 35th international symposium on symbolic and algebraic computation, ISSAC 2010, Munich, Germany, July 25–28, 2010. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-0150-3). 257-264 (2010).
PDFBibTeX XMLCite
Full Text: DOI

Decoding and finding the minimum distance with Gröbner bases: history and new insights. (English) Zbl 1206.94056

Woungang, Isaac (ed.) et al., Selected topics in information and coding theory. Hackensack, NJ: World Scientific (ISBN 978-981-283-716-5/hbk; 978-981-283-717-2/ebook). Series on Coding Theory and Cryptology 7, 585-622 (2010).
MSC:  94A60 13P10
PDFBibTeX XMLCite

Algebraic, AIDA/Cube and side channel analysis of KATAN family of block ciphers. (English) Zbl 1266.94020

Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 176-196 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Towards provable security of the unbalanced oil and vinegar signature scheme under direct attacks. (English) Zbl 1294.94036

Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 17-32 (2010).
MSC:  94A60 68Q17 94A62
PDFBibTeX XMLCite
Full Text: DOI

On the static Diffie-Hellman problem on elliptic curves over extension fields. (English) Zbl 1290.94079

Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 283-302 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Algebraic cryptanalysis of curry and flurry using correlated messages. (English) Zbl 1281.94023

Bao, Feng (ed.) et al., Information security and cryptology. 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-16341-8/pbk). Lecture Notes in Computer Science 6151, 266-277 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the hidden matrix cryptosystem. (English) Zbl 1285.94059

Abdalla, Michel (ed.) et al., Progress in cryptology – LATINCRYPT 2010. First international conference on cryptology and information security in Latin America, Puebla, Mexico, August 8–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14711-1/pbk). Lecture Notes in Computer Science 6212, 241-254 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Solving equation systems by agreeing and learning. (English) Zbl 1238.11110

Hasan, M. Anwar (ed.) et al., Arithmetic of finite fields. Third international workshop, WAIFI 2010, Istanbul, Turkey, June 27–30, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13796-9/pbk). Lecture Notes in Computer Science 6087, 151-165 (2010).
MSC:  11T71 68T20
PDFBibTeX XMLCite
Full Text: DOI Link

Selecting parameters for the Rainbow signature scheme. (English) Zbl 1286.94084

Sendrier, Nicolas (ed.), Post-quantum cryptography. Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12928-5/pbk). Lecture Notes in Computer Science 6061, 218-240 (2010).
MSC:  94A60 81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI

Proposal of a signature scheme based on STS trapdoor. (English) Zbl 1286.94088

Sendrier, Nicolas (ed.), Post-quantum cryptography. Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12928-5/pbk). Lecture Notes in Computer Science 6061, 201-217 (2010).
MSC:  94A60 81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI

Secure variants of the Square encryption scheme. (English) Zbl 1286.94063

Sendrier, Nicolas (ed.), Post-quantum cryptography. Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12928-5/pbk). Lecture Notes in Computer Science 6061, 153-164 (2010).
MSC:  94A60 81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of two quartic encryption schemes and one improved MFE scheme. (English) Zbl 1284.94061

Sendrier, Nicolas (ed.), Post-quantum cryptography. Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12928-5/pbk). Lecture Notes in Computer Science 6061, 41-60 (2010).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Growth of the ideal generated by a quadratic Boolean function. (English) Zbl 1284.94069

Sendrier, Nicolas (ed.), Post-quantum cryptography. Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12928-5/pbk). Lecture Notes in Computer Science 6061, 13-27 (2010).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: DOI

Algebraic cryptanalysis of McEliece variants with compact keys. (English) Zbl 1280.94051

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 279-298 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Geometric ideas for cryptographic equation solving in even characteristic. (English) Zbl 1234.94060

Parker, Matthew G. (ed.), Cryptography and coding. 12th IMA international conference, cryptography and coding 2009, Cirencester, UK, December 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10867-9/pbk). Lecture Notes in Computer Science 5921, 202-221 (2009).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

More on the security of linear RFID authentication protocols. (English) Zbl 1267.94077

Jacobson, Michael J. jun. (ed.) et al., Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05443-3/pbk). Lecture Notes in Computer Science 5867, 182-196 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Extensions of the cube attack based on low degree annihilators. (English) Zbl 1287.94105

Garay, Juan A. (ed.) et al., Cryptology and network security. 8th international conference, CANS 2009, Kanazawa, Japan, December 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10432-9/pbk). Lecture Notes in Computer Science 5888, 87-102 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Linear (hull) and algebraic cryptanalysis of the block cipher PRESENT. (English) Zbl 1287.94088

Garay, Juan A. (ed.) et al., Cryptology and network security. 8th international conference, CANS 2009, Kanazawa, Japan, December 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10432-9/pbk). Lecture Notes in Computer Science 5888, 58-75 (2009).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Cube attacks on tweakable black box polynomials. (English) Zbl 1239.94045

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 278-299 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Security analysis of multivariate polynomials for hashing. (English) Zbl 1237.94051

Yung, Moti (ed.) et al., Information security and cryptology. 4th international conference, Inscrypt 2008, Beijing, China, December 14–17, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-01439-0/pbk). Lecture Notes in Computer Science 5487, 115-124 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Square, a new multivariate encryption scheme. (English) Zbl 1237.94055

Fischlin, Marc (ed.), Topics in cryptology – CT-RSA 2009. The cryptographers’ track at the RSA conference 2009, San Francisco, CA, USA, April 20–24, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00861-0/pbk). Lecture Notes in Computer Science 5473, 252-264 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Specific S-box criteria in algebraic attacks on block ciphers with several known plaintexts. (English) Zbl 1166.94307

Lucks, Stefan (ed.) et al., Research in cryptology. Second Western European workshop, WEWoRC 2007, Bochum, Germany, July 4–6, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-88352-4/pbk). Lecture Notes in Computer Science 4945, 100-113 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Gröbner bases for public key cryptography. (English) Zbl 1237.94053

Jeffrey, David J. (ed.), ISSAC 2008. Proceedings of the twenty-first international symposium on symbolic and algebraic computation 2008, Linz/Hagenberg, Austria, July 20–23, 2008. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-59593-904-3). 315-324 (2008).
MSC:  94A60 13P10 68W30
PDFBibTeX XMLCite

Nonlinear piece in hand perturbation vector method for enhancing security of multivariate public key cryptosystems. (English) Zbl 1177.94147

Buchmann, Johannes (ed.) et al., Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). Lecture Notes in Computer Science 5299, 148-164 (2008).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Guess-and-determine algebraic attack on the self-shrinking generator. (English) Zbl 1154.68390

Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 235-252 (2008).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

On black-box ring extraction and integer factorization. (English) Zbl 1155.94362

Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 437-448 (2008).
MSC:  94A60 11Y05
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the TRMS signature scheme of PKC’05. (English) Zbl 1142.94333

Vaudenay, Serge (ed.), Progress in cryptology – AFRICACRYPT 2008. First international conference on cryptology in Africa, Casablanca, Morocco, June 11–14, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68159-5/pbk). Lecture Notes in Computer Science 5023, 143-155 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Toward a rigorous variation of Coppersmith’s algorithm on three variables. (English) Zbl 1141.94341

Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 361-378 (2007).
MSC:  94A60 11Y16 68W30
PDFBibTeX XMLCite
Full Text: DOI

When stream cipher analysis meets public-key cryptography. (English) Zbl 1161.94398

Biham, Eli (ed.) et al., Selected areas in cryptography. 13th international workshop, SAC 2006, Montreal, Canada, August 17–18, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74461-0/pbk). Lecture Notes in Computer Science 4356, 266-284 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

High order linearization equation (hole) attack on multivariate public key cryptosystems. (English) Zbl 1161.94395

Okamoto, Tatsuaki (ed.) et al., Public key cryptography – PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71676-1/pbk). Lecture Notes in Computer Science 4450, 233-248 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of HFE with internal perturbation. (English) Zbl 1127.94022

Okamoto, Tatsuaki (ed.) et al., Public key cryptography – PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71676-1/pbk). Lecture Notes in Computer Science 4450, 249-265 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A zero-dimensional Gröbner basis for AES-128. (English) Zbl 1234.94032

Robshaw, Matthew (ed.), Fast software encryption. 13th international workshop, FSE 2006, Graz, Austria, March 15–17, 2006. Revised selected papers. Berlin: Springer (ISBN 3-540-36597-4/pbk). Lecture Notes in Computer Science 4047, 78-88 (2006).
MSC:  94A60 13P10
PDFBibTeX XMLCite
Full Text: DOI

Using Wiedemann’s algorithm to compute the immunity against algebraic and fast algebraic attacks. (English) Zbl 1175.94074

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 236-250 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Polynomial equivalence problems: algorithmic and theoretical aspects. (English) Zbl 1140.94337

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 30-47 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An efficient provable distinguisher for HFE. (English) Zbl 1133.94316

Bugliesi, Michele (ed.) et al., Automata, languages and programming. 33rd international colloquium, ICALP 2006, Venice, Italy, July 10–14, 2006. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-35907-4/pbk). Lecture Notes in Computer Science 4052, 156-167 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Inoculating multivariate schemes against differential attacks. (English) Zbl 1151.94505

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 290-301 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Block ciphers sensitive to Gröbner basis attacks. (English) Zbl 1125.94013

Pointcheval, David (ed.), Topics in cryptology – CT-RSA 2006. The cryptographers’ track at the RSA conference 2006, San Jose, CA, USA, February 13–17, 2006. Proceedings. Berlin: Springer (ISBN 3-540-31033-9/pbk). Lecture Notes in Computer Science 3860, 313-331 (2006).
MSC:  94A60 13P10
PDFBibTeX XMLCite
Full Text: DOI

A “medium-field” multivariate public-key encryption scheme. (English) Zbl 1125.94028

Pointcheval, David (ed.), Topics in cryptology – CT-RSA 2006. The cryptographers’ track at the RSA conference 2006, San Jose, CA, USA, February 13–17, 2006. Proceedings. Berlin: Springer (ISBN 3-540-31033-9/pbk). Lecture Notes in Computer Science 3860, 132-149 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

On the discrete logarithm problem on algebraic tori. (English) Zbl 1145.94442

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 66-85 (2005).
MSC:  94A60 11T71 14G50
PDFBibTeX XMLCite
Full Text: DOI

Near optimal algorithms for solving differential equations of addition with batch queries. (English) Zbl 1153.94422

Maitra, Subhamoy (ed.) et al., Progress in cryptology – INDOCRYPT 2005. 6th international conference on cryptology in India, Bangalore, India, December 10–12, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30805-8/pbk). Lecture Notes in Computer Science 3797, 90-103 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

All in the XL family: Theory and practice. (English) Zbl 1133.94336

Park, Choonsik (ed.) et al., Information security and cryptology – ICISC 2004. 7th international conference, Seoul, Korea, December 2–3, 2004. Revised Selected Papers. Berlin: Springer (ISBN 978-3-540-26226-8/pbk). Lecture Notes in Computer Science 3506, 67-86 (2005).
MSC:  94A60 68W30
PDFBibTeX XMLCite
Full Text: DOI

Complexity estimates for the \(\mathbb F_4\) attack on the perturbed Matsumoto-Imai cryptosystem. (English) Zbl 1122.94034

Smart, Nigel P. (ed.), Cryptography and coding. 10th IMA international conference, Cirencester, UK, December 19–21, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30276-X/pbk). Lecture Notes in Computer Science 3796, 262-277 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Equivalent keys in HFE, \(C^*\), and variations. (English) Zbl 1126.94343

Dawson, Ed (ed.) et al., Progress in cryptology – Mycrypt 2005. First international conference on cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28–30, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28938-0/pbk). Lecture Notes in Computer Science 3715, 33-49 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Two attacks against the HBB stream cipher. (English) Zbl 1140.94350

Gilbert, Henri (ed.) et al., Fast software encryption. 12th international workshop, FSE 2005, Paris, France, February 21–23, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-26541-4/pbk). Lecture Notes in Computer Science 3557, 330-341 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Building secure tame-like multivariate public-key cryptosystems: the new TTS. (English) Zbl 1127.94356

Boyd, Colin (ed.) et al., Information security and privacy. 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4–6, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26547-3/pbk). Lecture Notes in Computer Science 3574, 518-531 (2005).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Solving systems of differential equations of addition (extended abstract). (English) Zbl 1127.94354

Boyd, Colin (ed.) et al., Information security and privacy. 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4–6, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26547-3/pbk). Lecture Notes in Computer Science 3574, 75-88 (2005).
MSC:  94A60 34M15
PDFBibTeX XMLCite
Full Text: DOI

A study of the security of unbalanced oil and vinegar signature schemes. (English) Zbl 1079.94536

Menezes, Alfred (ed.), Topics in cryptology – CT-RSA 2005. The cryptographers’ track at the RSA conference 2005, San Francisco, CA, USA, February 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24399-2/pbk). Lecture Notes in Computer Science 3376, 29-43 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of HFEv and internal perturbation of HFE. (English) Zbl 1081.94520

Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 288-301 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the tractable rational map cryptosystem. (English) Zbl 1081.94029

Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 258-274 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

General principles of algebraic attacks and new design criteria for cipher components. (English) Zbl 1117.94315

Dobbertin, Hans (ed.) et al., Advanced encryption standard – AES. 4th international conference, AES 2004, Bonn, Germany, May 10–12, 2004. Revised selected and invited papers. Berlin: Springer (ISBN 3-540-26557-0/pbk). Lecture Notes in Computer Science 3373, 67-83 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A new variant of the Matsumoto-Imai cryptosystem through perturbation. (English) Zbl 1198.94091

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 305-318 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Algebraic attacks over GF\((2^{k }\)), application to HFE challenge 2 and Sflash-v2. (English) Zbl 1198.94089

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 201-217 (2004).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

A more secure and efficacious TTS signature scheme. (English) Zbl 1092.94501

Lim, Jong In (ed.) et al., Information security and cryptology – ICISC 2003. 6th international conference, Seoul, Korea, November 27–28, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21376-7/pbk). Lecture Notes in Computer Science 2971, 320-338 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Theoretical analysis of XL over small fields. (English) Zbl 1098.94032

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 277-288 (2004).
PDFBibTeX XMLCite
Full Text: DOI

How to re-use round function in super-pseudorandom permutation. (English) Zbl 1098.94616

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 224-235 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On asymptotic security estimates in XL and Gröbner bases-related algebraic cryptanalysis. (English) Zbl 1109.94353

Lopez, Javier (ed.) et al., Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27–29, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23563-9/pbk). Lecture Notes in Computer Science 3269, 401-413 (2004).
MSC:  94A60 68Q25 68W30
PDFBibTeX XMLCite
Full Text: DOI

Comparison between XL and Gröbner basis algorithms. (English) Zbl 1094.94024

Lee, Pil Joong, Advances in cryptology – ASIACRYPT 2004. 10th international conference on the theory and application of cryptology and information security, Jeju Island, Korea, December 5–9, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23975-8/pbk). Lecture Notes in Computer Science 3329, 338-353 (2004).
MSC:  94A60 13P10 68W30
PDFBibTeX XMLCite
Full Text: DOI

Polynomial equivalence problems and applications to multivariate cryptosystems. (English) Zbl 1123.94006

Johansson, Thomas (ed.) et al., Progress in cryptology – INDOCRYPT 2003. 4th international conference on cryptology in India, New Delhi, India, December 8–10, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20609-4/pbk). Lect. Notes Comput. Sci. 2904, 235-251 (2003).
MSC:  94A60 13P10
PDFBibTeX XMLCite
Full Text: DOI

Algebraic cryptanalysis of hidden field equation (HFE) cryptosystems using Gröbner bases. (English) Zbl 1122.94371

Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 44-60 (2003).
MSC:  94A60 13P10 68W30
PDFBibTeX XMLCite
Full Text: DOI

Solving underdefined systems of multivariate quadratic equations. (English) Zbl 1055.94534

Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 211-227 (2002).
MSC:  94A62 11T71
PDFBibTeX XMLCite
Full Text: Link

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software