Author:
Courtois Nicolas T.,Patarin Jacques
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. B. Barkee, D. C. Can, J. Ecks, T. Moriarty, R. F. Ree: Why You Cannot Even Hope to use Gröbner Bases in Public Key Cryptography: An Open Letter to a S cientist Who Failed and a Challenge to Those Who Have Not Yet Failed, in Journal of Symbolic Computation 18, 1994, S. 497–501. 151
2. Don Coppersmith, Shmuel Winograd “Matrix multiplication via arithmetic progressions”; J. Symbolic Computation (1990), 9, pp. 251–280.
3. Lect Notes Comput Sci;N. Courtois,2002
4. Lect Notes Comput Sci;N. Courtois,2001
5. Nicolas Courtois and Josef Pieprzyk, Cryptanalysis of Block Ciphers with Overdefined Systems of Equations; to be presented at Asiacrypt 2002, a preprint with a different version of the attack is available at
http://eprint.iacr.org/2002/044/
. 141, 142, 150
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献