Sciweavers

223 search results - page 17 / 45
» Multivariates Polynomials for Hashing
Sort
View
148
Voted
FSE
2007
Springer
115views Cryptology» more  FSE 2007»
15 years 9 months ago
Improving the Security of MACs Via Randomized Message Preprocessing
Abstract. “Hash then encrypt” is an approach to message authentication, where first the message is hashed down using an ε-universal hash function, and then the resulting k-bi...
Yevgeniy Dodis, Krzysztof Pietrzak
ISSAC
2005
Springer
110views Mathematics» more  ISSAC 2005»
15 years 9 months ago
Multivariate power series multiplication
We study the multiplication of multivariate power series. We show that over large enough fields, the bilinear complexity of the product modulo a monomial ideal M is bounded by th...
Éric Schost
CORR
2010
Springer
139views Education» more  CORR 2010»
14 years 10 months ago
A recombination algorithm for the decomposition of multivariate rational functions
In this paper we show how we can compute in a deterministic way the decomposition of a multivariate rational function with a recombination strategy. The key point of our recombinat...
Guillaume Chèze
CASC
2009
Springer
103views Mathematics» more  CASC 2009»
15 years 10 months ago
Lazy and Forgetful Polynomial Arithmetic and Applications
We present lazy and forgetful algorithms for adding, multiplying and dividing multivariate polynomials. The lazy property allows us to compute the i-th term of a polynomial withou...
Michael B. Monagan, Paul Vrbik
127
Voted
EUROCRYPT
2006
Springer
15 years 7 months ago
Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects
The Isomorphism of Polynomials (IP) [28], which is the main concern of this paper, originally corresponds to the problem of recovering the secret key of a C scheme [26]. Besides, t...
Jean-Charles Faugère, Ludovic Perret