Polly cracker, revisited

MR Albrecht, P Farshim, JC Faugere… - International conference on …, 2011 - Springer
We initiate the formal treatment of cryptographic constructions (“Polly Cracker”) based on the
hardness of computing remainders modulo an ideal over multivariate polynomial rings. We …

[HTML][HTML] A Comprehensive Review of MI-HFE and IPHFE Cryptosystems: Advances in Internal Perturbations for Post-Quantum Security

Y Wang, L Li, Y Zhou, H Zhang - Axioms, 2024 - mdpi.com
The RSA cryptosystem has been a cornerstone of modern public key infrastructure;
however, recent advancements in quantum computing and theoretical mathematics pose …

A fully homomorphic cryptosystem with approximate perfect secrecy

M Hojsík, V Půlpánová - Topics in Cryptology–CT-RSA 2013: The …, 2013 - Springer
We propose a new fully homomorphic cryptosystem called Symmetric Polly Cracker
(SymPC) and we prove its security in the information theoretical settings. Namely, we prove …

[PDF][PDF] The proposed development of prototype with secret messages model in Whatsapp chat

H Hamdani, H Ismanto, AQ Munir… - International Journal of …, 2018 - academia.edu
Development of prototype at data security through secret messages is needed for disguising
the messages sent in smartphone chatting application, WhatsApp (WA) Chat. We propose a …

Polly cracker, revisited

MR Albrecht, JC Faugere, P Farshim, G Herold… - Designs, Codes and …, 2016 - Springer
We formally treat cryptographic constructions based on the hardness of deciding ideal
membership in multivariate polynomial rings. Of particular interest to us is a class of …

Why you cannot even hope to use Gröbner bases in cryptography: an eternal golden braid of failures

B Barkee, M Ceria, T Moriarty, A Visconti - Applicable Algebra in …, 2020 - Springer
Abstract In 1994, Moss Sweedler's dog proposed a cryptosystem, known as Barkee's
Cryptosystem, and the related cryptanalysis. Its explicit aim was to dispel the proposal of …

[PDF][PDF] Facultades de Ciencias Económicas, Cs. Exactas y Naturales e Ingeniería

L Udstuen, P Hecht - 2021 - bibliotecadigital.econ.uba.ar
Mientras el mundo está cada vez más conectado, con cada vez más datos migrándose a la
nube, cuestiones de seguridad todavía existen. Usuarios que eligen procesar datos en la …

[PDF][PDF] HOW IS POLLY? REVISITING THE DIFFERENTIAL ATTACK ON POLLY CRACKER AFTER 20 YEARS

C STROBL - lup.lub.lu.se
When building cryptographic systems, one is constantly on the hunt for hard to solve
problems, but are all problems suitable? In this thesis we will take a look at Gröbner bases …

[PDF][PDF] Algebra Computazionale B

O Papini - poisson.phc.dm.unipi.it
Algebra Computazionale B Page 1 Algebra Computazionale B basato sull’omonimo corso
tenuto dal prof. Carlo Traverso Anno Accademico 2012/13 - I semestre Oscar Papini Page 2 ii …

Aplikace Gröbnerových bází v kryptografii

A Fuchs - 2011 - dspace.cuni.cz
Název práce: Aplikace Gröbnerových bází v kryptografii Autor: Aleš Fuchs Katedra: Katedra
algebry Vedoucí diplomové práce: Mgr. Jan Št'ovíček Ph. D., Katedra algebry Abstrakt: V této …