Search Results - "Perret, Ludovic"
-
1
Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic
Published in Designs, codes, and cryptography (01-10-2013)“…We investigate in this paper the security of HFE and Multi-HFE schemes as well as their minus and embedding variants. Multi-HFE is a generalization of the…”
Get full text
Journal Article -
2
Cryptanalysis of the extension field cancellation cryptosystem
Published in Designs, codes, and cryptography (01-06-2021)“…In this article, we present algebraic attacks against the Extension Field Cancellation ( EFC ) scheme, a multivariate public-key encryption scheme which was…”
Get full text
Journal Article -
3
On the complexity of the BKW algorithm on LWE
Published in Designs, codes, and cryptography (01-02-2015)“…This work presents a study of the complexity of the Blum–Kalai–Wasserman (BKW) algorithm when applied to the Learning with Errors (LWE) problem, by providing…”
Get full text
Journal Article -
4
Hybrid approach for solving multivariate systems over finite fields
Published in Journal of mathematical cryptology (01-09-2009)“…In this paper, we present an improved approach to solve multivariate systems over finite fields. Our approach is a tradeoff between exhaustive search and…”
Get full text
Journal Article -
5
Software Toolkit for HFE-based Multivariate Schemes
Published in IACR transactions on cryptographic hardware and embedded systems (09-05-2019)“…In 2017, NIST shook the cryptographic world by starting a process for standardizing post-quantum cryptography. Sixty-four submissions have been considered for…”
Get full text
Journal Article -
6
A Distinguisher for High-Rate McEliece Cryptosystems
Published in IEEE transactions on information theory (01-10-2013)“…The Goppa Code Distinguishing (GD) problem consists in distinguishing the matrix of a Goppa code from a random matrix. The hardness of this problem is an…”
Get full text
Journal Article -
7
A distinguisher for high rate McEliece cryptosystems
Published in 2011 IEEE Information Theory Workshop (01-10-2011)“…The Goppa Code Distinguishing (GCD) problem consists in distinguishing the matrix of a Goppa code from a random matrix. Up to now, it is widely believed that…”
Get full text
Conference Proceeding -
8
Software Toolkit for HFE-based Multivariate Schemes
Published in IACR transactions on cryptographic hardware and embedded systems (09-05-2019)“…In 2017, NIST shook the cryptographic world by starting a process for standardizing post-quantum cryptography. Sixty-four submissions have been considered for…”
Get full text
Journal Article -
9
A nearly optimal algorithm to decompose binary forms
Published in Journal of symbolic computation (01-07-2021)“…Symmetric tensor decomposition is an important problem with applications in several areas, for example signal processing, statistics, data analysis and…”
Get full text
Journal Article -
10
Folding Alternant and Goppa Codes With Non-Trivial Automorphism Groups
Published in IEEE transactions on information theory (01-01-2016)“…The main practical limitation of the McEliece public-key encryption scheme is probably the size of its key. A famous trend to overcome this issue is to focus…”
Get full text
Journal Article -
11
Structural cryptanalysis of McEliece schemes with compact keys
Published in Designs, codes, and cryptography (01-04-2016)“…A very popular trend in code-based cryptography is to decrease the public-key size by focusing on subclasses of alternant/Goppa codes which admit a very…”
Get full text
Journal Article -
12
Polynomial-time algorithms for quadratic isomorphism of polynomials: The regular case
Published in Journal of Complexity (01-08-2015)“…Let f=(f1,…,fm) and g=(g1,…,gm) be two sets of m≥1 nonlinear polynomials in K[x1,…,xn] (K being a field). We consider the computational problem of finding–if…”
Get full text
Journal Article -
13
Algebraic Cryptanalysis of McEliece Variants with Compact Keys
Published in Advances in Cryptology – EUROCRYPT 2010 (2010)“…In this paper we propose a new approach to investigate the security of the McEliece cryptosystem. We recall that this cryptosystem relies on the use of…”
Get full text
Book Chapter -
14
Hardness of learning problems over Burnside groups of exponent 3
Published in Designs, codes, and cryptography (01-04-2015)“…In this work, we investigate the hardness of learning Burnside homomorphisms with noise ( B n - LHN ), a computational problem introduced in the recent work of…”
Get full text
Journal Article -
15
Polly Cracker, revisited
Published in Designs, codes, and cryptography (01-05-2016)“…We formally treat cryptographic constructions based on the hardness of deciding ideal membership in multivariate polynomial rings. Of particular interest to us…”
Get full text
Journal Article -
16
On the relation between the MXL family of algorithms and Gröbner basis algorithms
Published in Journal of symbolic computation (01-08-2012)“…The computation of Gröbner bases remains one of the most powerful methods for tackling the Polynomial System Solving (PoSSo) problem. The most efficient known…”
Get full text
Journal Article -
17
Mathematical and computer algebra techniques in cryptology
Published in Journal of Symbolic Computation (01-08-2014)“…This issue of the Journal of Symbolic Computation is devoted to Mathematical and Computer Algebra Techniques in Cryptology. It has been organized after the…”
Get full text
Journal Article Publication -
18
Quantum-Safe Hybrid Key Exchanges with KEM-Based Authentication
Published 06-11-2024“…Authenticated Key Exchange (AKE) between any two entities is one of the most important security protocols available for securing our digital networks and…”
Get full text
Journal Article -
19
-
20