Up to now, any attempt to use Gröbner bases in the design of public key cryptosystems has failed, as anticipated by a classical paper of B. Barkee et al.; we show why, and show that the only residual hope is to use binomial ideals, i.e. lattices. We propose two lattice-based cryptosystems that will show the usefulness of multivariate polynomial algebra and Gröb-ner bases in the construction of public key cryptosystems. The first one tries to revive two cryptosystems Polly Cracker and GGH, that have been considered broken, through a hybrid; the second one improves a cryptosystem (NTRU) that only has heuristic and challenged evidence of security, providing evidence that the extension cannot be broken with some of the standard lattice tools ...
The 1996 proposal by Hoffstein, Pfeiffer, and Silverman for the NTRU public key encryption system pr...
This paper presents an upgrade on the key generation algorithm of a current variant of the Goldreich...
We present a technique to enhance the security of the Goldreich, Goldwasser and Halevi (GGH) scheme....
Up to now, any attempt to use Gröbner bases in the design of public key cryptosystems has failed, as...
Using Gröbner bases for the construction of public key cryptosystems has been often attempted, but h...
AbstractUsing Gröbner bases for the construction of public key cryptosystems has been often attempte...
Lattice Polly Cracker, is a public key cryptosystem that uses Gröbner bases of lattices for the prep...
Multivariate algebra plays a central role in today's cryptography. The most popular public key cryp...
Title: Applications of Gröbner bases in cryptography Author: Aleš Fuchs Department: Department of Al...
We shortly review the Polly Cracker family of cryptosystems. Apparently all the cryptosystems of t...
We present the noncommutative version of the Polly Cracker cryptosystem, which is more promising tha...
In 1994, Moss Sweedler\u2019s dog proposed a cryptosystem, known as Barkee\u2019s Cryptosystem, and ...
In 1994, Moss Sweedler’s dog proposed a cryptosystem, known as Barkee’s Cryptosystem, and the relate...
International audienceWe initiate the formal treatment of cryptographic constructions (“Polly Cracke...
Public-key cryptography is an indispensable component used in almost all of our present-day digital ...
The 1996 proposal by Hoffstein, Pfeiffer, and Silverman for the NTRU public key encryption system pr...
This paper presents an upgrade on the key generation algorithm of a current variant of the Goldreich...
We present a technique to enhance the security of the Goldreich, Goldwasser and Halevi (GGH) scheme....
Up to now, any attempt to use Gröbner bases in the design of public key cryptosystems has failed, as...
Using Gröbner bases for the construction of public key cryptosystems has been often attempted, but h...
AbstractUsing Gröbner bases for the construction of public key cryptosystems has been often attempte...
Lattice Polly Cracker, is a public key cryptosystem that uses Gröbner bases of lattices for the prep...
Multivariate algebra plays a central role in today's cryptography. The most popular public key cryp...
Title: Applications of Gröbner bases in cryptography Author: Aleš Fuchs Department: Department of Al...
We shortly review the Polly Cracker family of cryptosystems. Apparently all the cryptosystems of t...
We present the noncommutative version of the Polly Cracker cryptosystem, which is more promising tha...
In 1994, Moss Sweedler\u2019s dog proposed a cryptosystem, known as Barkee\u2019s Cryptosystem, and ...
In 1994, Moss Sweedler’s dog proposed a cryptosystem, known as Barkee’s Cryptosystem, and the relate...
International audienceWe initiate the formal treatment of cryptographic constructions (“Polly Cracke...
Public-key cryptography is an indispensable component used in almost all of our present-day digital ...
The 1996 proposal by Hoffstein, Pfeiffer, and Silverman for the NTRU public key encryption system pr...
This paper presents an upgrade on the key generation algorithm of a current variant of the Goldreich...
We present a technique to enhance the security of the Goldreich, Goldwasser and Halevi (GGH) scheme....