As one of the most fundamental problems in multivariate public key cryptosystems (MPKC), Isomorphism of Polynomial (IP) induces an equivalence relation on the polynomials systems. The enumeration problem associated to IP consists of counting the number of equivalence classes and the cardinality of each class. The two problems correspond exactly to the study of the total number of different cryptographic schemes and the size of “equivalent keys”. In this paper we give an algorithm using a divide-and-conquer method to count the number of equivalence classes according to the linear equivalence relation induced by the IP1S problem when . Then by giving the complexity gain of this algorithm compared with the exhaustive search algorithm and the e...
In this paper, we give several kinds of characterisations of isomorphic authentication codes by exam...
One of the important research problems in cryptography is the problem of solving multivariate polyno...
We investigate the computational complexity of the Boolean isomorphism problem (BI): on input of two...
AbstractThe Isomorphism of Polynomials (IP) is one of the most fundamental problems in multivariate ...
International audienceThe Isomorphism of Polynomials (IP) is one of the most fundamental problems in...
In this paper, we propose an efficient multivariate public key cryptosystem. Public key of our crypt...
We study the problems of testing isomorphism of polynomials, algebras, and multilinear forms. Our fi...
International audienceWe give three new algorithms to solve the "isomorphism of polynomial" problem,...
This thesis focuses on polynomial commitment schemes - cryptographic protocols that allow committing...
We consider the polynomial linear equivalence (PLE) problem arising from the multivariate public key...
International audienceThis paper presents a practical cryptanalysis of the Identification Scheme pro...
We study the problems of testing isomorphism of polynomials, algebras, andmultilinear forms. Our fir...
AbstractWe consider the problem of learning a polynomial over an arbitrary fieldFdefined on a set of...
AbstractIn the Subgraph Isomorphism problem we are given two graphs F and G on k and n vertices resp...
Most integers are composite and most univariate polynomials over a finite field are reducible. The P...
In this paper, we give several kinds of characterisations of isomorphic authentication codes by exam...
One of the important research problems in cryptography is the problem of solving multivariate polyno...
We investigate the computational complexity of the Boolean isomorphism problem (BI): on input of two...
AbstractThe Isomorphism of Polynomials (IP) is one of the most fundamental problems in multivariate ...
International audienceThe Isomorphism of Polynomials (IP) is one of the most fundamental problems in...
In this paper, we propose an efficient multivariate public key cryptosystem. Public key of our crypt...
We study the problems of testing isomorphism of polynomials, algebras, and multilinear forms. Our fi...
International audienceWe give three new algorithms to solve the "isomorphism of polynomial" problem,...
This thesis focuses on polynomial commitment schemes - cryptographic protocols that allow committing...
We consider the polynomial linear equivalence (PLE) problem arising from the multivariate public key...
International audienceThis paper presents a practical cryptanalysis of the Identification Scheme pro...
We study the problems of testing isomorphism of polynomials, algebras, andmultilinear forms. Our fir...
AbstractWe consider the problem of learning a polynomial over an arbitrary fieldFdefined on a set of...
AbstractIn the Subgraph Isomorphism problem we are given two graphs F and G on k and n vertices resp...
Most integers are composite and most univariate polynomials over a finite field are reducible. The P...
In this paper, we give several kinds of characterisations of isomorphic authentication codes by exam...
One of the important research problems in cryptography is the problem of solving multivariate polyno...
We investigate the computational complexity of the Boolean isomorphism problem (BI): on input of two...