Sciweavers

223 search results - page 22 / 45
» Multivariates Polynomials for Hashing
Sort
View
116
Voted
SPDP
1993
IEEE
15 years 7 months ago
Fast Rehashing in PRAM Emulations
In PRAM emulations, universal hashing is a well-known method for distributing the address space among memory modules. However, if the memory access patterns of an application ofte...
J. Keller
131
Voted
AES
2004
Springer
151views Cryptology» more  AES 2004»
15 years 8 months ago
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
This paper is about the design of multivariate public key schemes, as well as block and stream ciphers, in relation to recent attacks that exploit various types of multivariate alg...
Nicolas Courtois
CASC
2005
Springer
202views Mathematics» more  CASC 2005»
15 years 9 months ago
Cayley-Dixon Resultant Matrices of Multi-univariate Composed Polynomials
The behavior of the Cayley-Dixon resultant construction and the structure of Dixon matrices are analyzed for composed polynomial systems constructed from a multivariate system in w...
Arthur D. Chtcherba, Deepak Kapur, Manfred Minimai...
101
Voted
MP
2006
80views more  MP 2006»
15 years 3 months ago
Minimizing Polynomials via Sum of Squares over the Gradient Ideal
A method is proposed for finding the global minimum of a multivariate polynomial via sum of squares (SOS) relaxation over its gradient variety. That variety consists of all points ...
Jiawang Nie, James Demmel, Bernd Sturmfels
PQCRYPTO
2010
149views Cryptology» more  PQCRYPTO 2010»
15 years 7 months ago
Proposal of a Signature Scheme Based on STS Trapdoor
A New digital signature scheme based on Stepwise Triangular Scheme (STS) is proposed. The proposed trapdoor has resolved the vulnerability of STS and secure against both Gr¨obner ...
Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki, ...