Algebraic Attacks over GF(2 k ), Application to HFE Challenge 2 and Sflash-v2
- 1 January 2004
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of ToyocryptPublished by Springer Nature ,2003
- About the XL Algorithm over GF(2)Published by Springer Nature ,2003
- On the Security of HFE, HFEv- and QuartzPublished by Springer Nature ,2002
- A Fast and Secure Implementation of SflashPublished by Springer Nature ,2002
- Solving Underdefined Systems of Multivariate Quadratic EquationsPublished by Springer Nature ,2002
- The Security of Hidden Field Equations (HFE)Published by Springer Nature ,2001
- FLASH, a Fast Multivariate Signature AlgorithmPublished by Springer Nature ,2001
- C−+* and HM: Variations Around Two Schemes of T. Matsumoto and H. ImaiPublished by Springer Nature ,1998
- Why You Cannot Even Hope to use Gröbner Bases in Public Key Cryptography: An Open Letter to a Scientist Who Failed and a Challenge to Those Who Have Not Yet FailedJournal of Symbolic Computation, 1994
- Matrix multiplication via arithmetic progressionsJournal of Symbolic Computation, 1990