“…For applications to stream ciphers, see [7,8]; to PKC's especially about its variant types, see [9,12]; for block ciphers and the somewhat contentious related method of XSL, see [13], and also [29,30]. We will build on recent theoretical developments in XL ( [15,36,40,42]) for better security estimates under XL and related methods, including Gröbner Bases. More details can also be found in [9,12,13].…”