Attacking a polynomial-based cryptosystem: Polly Cracker
暂无分享,去创建一个
Rainer Steinwandt | Willi Geiselmann | Regine Endsuleit | R. Steinwandt | W. Geiselmann | Regine Endsuleit
[1] M. Fellows. Combinatorial Cryptosystems Galore! , 2022 .
[2] Jacques Patarin,et al. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms , 1996, EUROCRYPT.
[3] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[4] Igor E. Shparlinski,et al. Cryptographic Applications of Sparse Polynomials over Finite Rings , 2000, ICISC.
[5] Robert H. Deng,et al. Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems , 2001, Public Key Cryptography.
[6] Igor E. Shparlinski,et al. A Public Key Cryptosystem Based on Sparse Polynomials , 2000 .
[7] Igor E. Shparlinski,et al. An Identification Scheme Based on Sparse Polynomials , 2000, Public Key Cryptography.
[8] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[9] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[10] John J. Cannon,et al. The Magma Algebra System I: The User Language , 1997, J. Symb. Comput..
[11] Dennis Hofheinz,et al. A "differential" attack on Polly Cracker , 2002, Proceedings IEEE International Symposium on Information Theory,.
[12] Johannes Buchmann,et al. Coding Theory, Cryptography and Related Areas , 2000, Springer Berlin Heidelberg.
[13] Thomas Beth,et al. A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH , 2001, ISC.
[14] Neal Koblitz,et al. Algebraic aspects of cryptography , 1998, Algorithms and computation in mathematics.
[15] D. Welsh,et al. A Spectral Technique for Coloring Random 3-Colorable Graphs , 1994 .