Breaking an Identity-Based Encryption Scheme Based on DHIES
暂无分享,去创建一个
[1] John J. Cannon,et al. The Magma Algebra System I: The User Language , 1997, J. Symb. Comput..
[2] David A. Cox,et al. Ideals, Varieties, and Algorithms , 1997 .
[3] Hideki Imai,et al. Comparison Between XL and Gröbner Basis Algorithms , 2004, ASIACRYPT.
[4] Daniel Lazard,et al. Gröbner-Bases, Gaussian elimination and resolution of systems of algebraic equations , 1983, EUROCAL.
[5] David A. Cox,et al. Ideals, Varieties, and Algorithms: An Introduction to Computational Algebraic Geometry and Commutative Algebra, 3/e (Undergraduate Texts in Mathematics) , 2007 .
[6] Jean Charles Faugère,et al. A new efficient algorithm for computing Gröbner bases without reduction to zero (F5) , 2002, ISSAC '02.
[7] J. Faugère,et al. On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations , 2004 .
[8] J. Faugère. A new efficient algorithm for computing Gröbner bases (F4) , 1999 .
[9] Joonsang Baek,et al. On the security of the identity-based encryption based on DHIES from ASIACCS 2010 , 2011, ASIACCS '11.
[10] Zhi Guan,et al. Identity-based encryption based on DHIES , 2010, ASIACCS '10.
[11] Noga Alon,et al. The Probabilistic Method , 2015, Fundamentals of Ramsey Theory.