On finding small solutions of modular multivariate polynomial equations (original) (raw)

Finding Small Solutions to Small Degree Polynomials

Don Coppersmith

Lecture Notes in Computer Science, 2001

View PDFchevron_right

Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences

phong nguyen

Lecture Notes in Computer Science, 2014

View PDFchevron_right

Rounding LLL: Finding Faster Small Roots of Univariate Polynomial Congruences

phong nguyen

IACR Cryptology ePrint Archive, 2013

View PDFchevron_right

A New Approach for Finding Low-Weight Polynomial Multiples

Laila El Aimani

Information Security and Cryptology, 2021

View PDFchevron_right

Randomization of Arithmetic Over Polynomial Modular Number System

Pascal Véron

2019 IEEE 26th Symposium on Computer Arithmetic (ARITH), 2019

View PDFchevron_right

A generalized attack on RSA type cryptosystems

Martin Bunder

Theoretical Computer Science

View PDFchevron_right

Algebraic Algorithm for Solving Linear Congruences: Its Application To Cryptography

Asia Pacific Journal of Education Perspective

Asia Pacific Journal of Education, Arts and Sciences, 2014

View PDFchevron_right

Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99

Phong Nguyen

International Conference on the Theory and Application of Cryptology and Information Security, 2000

View PDFchevron_right

A strategy for recovering roots of bivariate polynomials modulo a prime

Paula Bustillo

IACR Cryptol. ePrint Arch., 2009

View PDFchevron_right

A New Partial Key Exposure Attack on Multi-power RSA

Mehmet Sabir Kiraz

Lecture Notes in Computer Science, 2015

View PDFchevron_right

A new attack on RSA and Demytko’s elliptic curve cryptosystem

emmanuel Fouotsa

Journal of Discrete Mathematical Sciences and Cryptography

View PDFchevron_right

On selection of samples in algebraic attacks and a new technique to find hidden low degree equations

Nicolas Courtois

International Journal of Information Security, 2015

View PDFchevron_right

The effectiveness of lattice attacks against low-exponent RSA (Coupé, C., Nguyen, P. & Stern, J.)

Christophe Coupé

Proceedings of Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, H. Imai and Y. Zheng (Eds.), Volume 1560 of Lecture Notes in Computer Science , 1999

View PDFchevron_right

A pr 2 02 2 Schwartz-Zippel for multilinear polynomials mod N

Benedikt Bünz

2022

View PDFchevron_right

MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis

wael tawah

2009

View PDFchevron_right

The Effectiveness of Lattice Attacks Against Low-Exponent RSA

phong nguyen

Lecture Notes in Computer Science, 1999

View PDFchevron_right

A message recovery attack on multivariate polynomial trapdoor function

Saba Inam

PeerJ Computer Science

View PDFchevron_right

Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations

Nicolas Courtois

Advances in Cryptology— …, 2000

View PDFchevron_right

Revisiting the Polynomial-Time Equivalence of Computing the CRT-RSA Secret Key and Factoring

Mengce Zheng

Mathematics

View PDFchevron_right

Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities

Don Coppersmith

Journal of Cryptology, 1997

View PDFchevron_right

Classical Attacks on a Variant of the RSA Cryptosystem

Nurul Adenan

Progress in Cryptology – LATINCRYPT 2021, 2021

View PDFchevron_right

Polynomial Time Attacks for Modulus NN = pp22qq22

SADIQ SHEHU

2020

View PDFchevron_right

Schwartz-Zippel for multilinear polynomials mod N

Benedikt Bünz

ArXiv, 2022

View PDFchevron_right

Partitioning multivariate polynomial equations via vertex cuts for algebraic cryptanalysis and other applications

Robert H Lewis

2008

View PDFchevron_right

New Practical Algebraic Public-Key Cryptosystem and Some Related Algebraic and Computational Aspects

Semen Rososhek

Applied Mathematics, 2013

View PDFchevron_right

New cryptanalytic results upon prime power moduli N = prq

SADIQ SHEHU

PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES AND TECHNOLOGY 2018 (MATHTECH2018): Innovative Technologies for Mathematics & Mathematics for Technological Innovation

View PDFchevron_right

Cryptanalysis of an authentication scheme using truncated polynomials

Arif Umar

Information Processing Letters, 2009

View PDFchevron_right

On the computation of modular polynomials for elliptic curves

Ian Blake

1999

View PDFchevron_right

On the genericity of the modular polynomial GCD algorithm

Michael Monagan

1999

View PDFchevron_right

Polynomial representations of the Diffie-Hellman mapping

Edwin El-Mahassni

Bulletin of the Australian Mathematical Society, 2001

View PDFchevron_right

Polynomial Structures in Code-Based Cryptography

Pierre-Louis Cayrel

Lecture Notes in Computer Science, 2013

View PDFchevron_right

Algebraic attack on the MQQ public key cryptosystem

emam mohamed

2009

View PDFchevron_right

A polynomial time attack against algebraic geometry code based public key cryptosystems

R. Pellikaan, Alain Couvreur

2014 IEEE International Symposium on Information Theory, 2014

View PDFchevron_right

New Attacks on the RSA Cryptosystem

Muhammad Rezal

Progress in Cryptology – AFRICACRYPT 2014, 2014

View PDFchevron_right

Algebraic Attacks Galore!

Martin Kreuzer

Groups, complexity, cryptology, 2009

View PDFchevron_right