International audienceThe Isomorphism of Polynomials (IP) is one of the most fundamental problems in multivariate public key cryptography (MPKC). In this paper, we introduce a new framework to study the counting problem associated to IP. Namely, we present tools of finite geometry allowing to investigate the counting problem associated to IP. Precisely, we focus on enumerating or estimating the number of isomorphism equivalence classes of homogeneous quadratic polynomial systems. These problems are equivalent to finding the scale of the key space of a multivariate cryptosystem and the total number of different multivariate cryptographic schemes respectively, which might impact the security and the potential capability of MPKC. We also consi...
Recently Landau and Diffie gave in a series of articles in the Notices of the American Mathematical ...
We consider the polynomial linear equivalence (PLE) problem arising from the multivariate public key...
Abstract. This paper gives a new example of exploiting the idea of using polynomials with restricted...
AbstractThe Isomorphism of Polynomials (IP) is one of the most fundamental problems in multivariate ...
As one of the most fundamental problems in multivariate public key cryptosystems (MPKC), Isomorphism...
International audienceThe Isomorphism of Polynomials (IP) is one of the most fundamental problems in...
We study the problems of testing isomorphism of polynomials, algebras, and multilinear forms. Our fi...
We study the problems of testing isomorphism of polynomials, algebras, andmultilinear forms. Our fir...
This thesis focuses on polynomial commitment schemes - cryptographic protocols that allow committing...
In this article, we investigate the question of equivalent keys for two Multivariate Quadratic publi...
In this article, we investigate the question of equivalent keys for two Multivariate Quadratic publi...
Most public key cryptosystems used in practice are based on integer factorization or discrete logari...
International audienceWe give three new algorithms to solve the "isomorphism of polynomial" problem,...
In this paper, we propose an efficient multivariate public key cryptosystem. Public key of our crypt...
AbstractWe say that the sequence (an) is quasi-polynomial in n if there exist polynomials P0,…,Ps−1 ...
Recently Landau and Diffie gave in a series of articles in the Notices of the American Mathematical ...
We consider the polynomial linear equivalence (PLE) problem arising from the multivariate public key...
Abstract. This paper gives a new example of exploiting the idea of using polynomials with restricted...
AbstractThe Isomorphism of Polynomials (IP) is one of the most fundamental problems in multivariate ...
As one of the most fundamental problems in multivariate public key cryptosystems (MPKC), Isomorphism...
International audienceThe Isomorphism of Polynomials (IP) is one of the most fundamental problems in...
We study the problems of testing isomorphism of polynomials, algebras, and multilinear forms. Our fi...
We study the problems of testing isomorphism of polynomials, algebras, andmultilinear forms. Our fir...
This thesis focuses on polynomial commitment schemes - cryptographic protocols that allow committing...
In this article, we investigate the question of equivalent keys for two Multivariate Quadratic publi...
In this article, we investigate the question of equivalent keys for two Multivariate Quadratic publi...
Most public key cryptosystems used in practice are based on integer factorization or discrete logari...
International audienceWe give three new algorithms to solve the "isomorphism of polynomial" problem,...
In this paper, we propose an efficient multivariate public key cryptosystem. Public key of our crypt...
AbstractWe say that the sequence (an) is quasi-polynomial in n if there exist polynomials P0,…,Ps−1 ...
Recently Landau and Diffie gave in a series of articles in the Notices of the American Mathematical ...
We consider the polynomial linear equivalence (PLE) problem arising from the multivariate public key...
Abstract. This paper gives a new example of exploiting the idea of using polynomials with restricted...