2006
DOI: 10.1007/11818175_21
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of 2R− Schemes

Abstract: Abstract. In this paper, we study the security of 2R − schemes [17,18], which are the "minus variant" of two-round schemes. This variant consists in removing some of the n polynomials of the public key, and permits to thwart an attack described at Crypto'99 [25] against two-round schemes. Usually, the "minus variant" leads to a real strengthening of the considered schemes. We show here that this is actually not true for 2R − schemes. We indeed propose an efficient algorithm for decomposing 2R − schemes. For in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
18
0

Year Published

2008
2008
2012
2012

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(19 citation statements)
references
References 18 publications
1
18
0
Order By: Relevance
“…where t ∈ C [11]. Therefore, although we cannot generally find the construction of the anti-particle representation of this most general many-body quantum system at finite temperature, without considerable effort, we can easily identify that the basis functions which have no t in them will generate I ∩ (x 1 ), and in fact these elements form an exact Gröbner basis, as will now show.…”
Section: Z 2 -Grading and The Braid Groupmentioning
confidence: 89%
See 3 more Smart Citations
“…where t ∈ C [11]. Therefore, although we cannot generally find the construction of the anti-particle representation of this most general many-body quantum system at finite temperature, without considerable effort, we can easily identify that the basis functions which have no t in them will generate I ∩ (x 1 ), and in fact these elements form an exact Gröbner basis, as will now show.…”
Section: Z 2 -Grading and The Braid Groupmentioning
confidence: 89%
“…However, clearly this approach is not very instructive for (10) since we are reducing the polynomial ring in (6) to a factor algebra where the grade projection is onto a trivial center, but for more subtle reasons, we now argue, neither is (11). Formally, the Clifford algebra Cl associates a quadratic form η to the associative algebra generated by the elements {Γ l }…”
Section: Clifford Algebramentioning
confidence: 99%
See 2 more Smart Citations
“…Most of them deal with quadratic polynomials [5,18,19,21,26], and some of them deal with polynomials of degree greater than two [6,10,12,22,32]. In symmetric cryptography, Berbain et al proposed QUAD, which is a stream cipher with provable security based on the MQ problem [5].…”
Section: Introductionmentioning
confidence: 99%