Theoretical Analysis of XL over Small Fields
- 1 January 2004
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- Algebraic Attacks over GF(2 k ), Application to HFE Challenge 2 and Sflash-v2Published by Springer Nature ,2004
- Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of ToyocryptPublished by Springer Nature ,2003
- About the XL Algorithm over GF(2)Published by Springer Nature ,2003
- Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner BasesPublished by Springer Nature ,2003
- Fast Algebraic Attacks on Stream Ciphers with Linear FeedbackPublished by Springer Nature ,2003
- Cryptanalysis of Block Ciphers with Overdefined Systems of EquationsPublished by Springer Nature ,2002
- Essential Algebraic Structure within the AESPublished by Springer Nature ,2002
- Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric AlgorithmsPublished by Springer Nature ,1996
- Triangular factorization and inversion by fast matrix multiplicationMathematics of Computation, 1974
- Gaussian elimination is not optimalNumerische Mathematik, 1969