Algebraic Attacks over GF(2 k ), Application to HFE Challenge 2 and Sflash-v2
- 1 January 2004
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of ToyocryptLecture Notes in Computer Science, 2003
- About the XL Algorithm over GF(2)Lecture Notes in Computer Science, 2003
- On the Security of HFE, HFEv- and QuartzLecture Notes in Computer Science, 2002
- A Fast and Secure Implementation of SflashLecture Notes in Computer Science, 2002
- Solving Underdefined Systems of Multivariate Quadratic EquationsLecture Notes in Computer Science, 2002
- The Security of Hidden Field Equations (HFE)Lecture Notes in Computer Science, 2001
- FLASH, a Fast Multivariate Signature AlgorithmLecture Notes in Computer Science, 2001
- C−+* and HM: Variations Around Two Schemes of T. Matsumoto and H. ImaiLecture Notes in Computer Science, 1998
- Why You Cannot Even Hope to use Gröbner Bases in Public Key Cryptography: An Open Letter to a Scientist Who Failed and a Challenge to Those Who Have Not Yet FailedJournal of Symbolic Computation, 1994
- Matrix multiplication via arithmetic progressionsJournal of Symbolic Computation, 1990