Abstract:We propose an algebraic framework to represent zero-dimensional algebraic systems. In this framework, we give new interpolation formulae. We use this good representation of the algebraic systems to develop a generalization of Weierstrass's method to the multivariate systems. This method allows us to approximate simultaneously all the roots of an algebraic system. We obtain an effective iteration function with a quadratic convergence in a neighbourhood of the solutions. We use this Weierstrass iteration functio… Show more
“…The general multivariate Lagrange interpolation problem has been addressed in [23], but the proposed algorithm has cubic complexity (on the number of monomials). We will present an algorithm with a quadratic complexity over F instead.…”
Abstract. In this paper we propose several efficient algorithms for assessing the resistance of Boolean functions against algebraic and fast algebraic attacks when implemented in LFSR-based stream ciphers. An algorithm is described which permits to compute the algebraic immu-operations necessary in all previous algorithms. Our algorithm is based on multivariate polynomial interpolation. For assessing the vulnerability of arbitrary Boolean functions with respect to fast algebraic attacks, an efficient generic algorithm is presented that is not based on interpolation. This algorithm is demonstrated to be particularly efficient for symmetric Boolean functions. As an application it is shown that large classes of symmetric functions are very vulnerable to fast algebraic attacks despite their proven resistance against conventional algebraic attacks.
“…The general multivariate Lagrange interpolation problem has been addressed in [23], but the proposed algorithm has cubic complexity (on the number of monomials). We will present an algorithm with a quadratic complexity over F instead.…”
Abstract. In this paper we propose several efficient algorithms for assessing the resistance of Boolean functions against algebraic and fast algebraic attacks when implemented in LFSR-based stream ciphers. An algorithm is described which permits to compute the algebraic immu-operations necessary in all previous algorithms. Our algorithm is based on multivariate polynomial interpolation. For assessing the vulnerability of arbitrary Boolean functions with respect to fast algebraic attacks, an efficient generic algorithm is presented that is not based on interpolation. This algorithm is demonstrated to be particularly efficient for symmetric Boolean functions. As an application it is shown that large classes of symmetric functions are very vulnerable to fast algebraic attacks despite their proven resistance against conventional algebraic attacks.
“…Many known methods base on Newton's method which can converge to the solution in another simplex [12], [13]. This implies that some solutions may be missed and some may be found several times.…”
Section: Discussionmentioning
confidence: 99%
“…The most popular iterative method is Newton's method and it works well locally and only if initial point is a good guess, which is difficult in solving systems of polynomial equations. Other methods are Newton like methods, minimization methods or Weierstrass method [12], [13].…”
Abstract-In this paper we present an improvement of the algorithm based on recursive de Casteljau subdivision over an ndimensional bounded domain (simplex or box). The modification consists of a novel end condition and a way of calculation the root in subdomain. Both innovations are based on linear approximation of polynomials in a system. This improvement results in that our approach takes almost half of the time of the standard approach: it can be stopped much earlier than using standard diameter condition and getting midpoint of a subdomain as a root.
“…Furthermore, since such a monomial set exists for any monomial order, there is not a unique basis if we do not fix an order. In [12], closed formula for idempotents and for interpolation are given. Here above we give the closed formula for the solution of the problem 2, but use directly this formula drives to a cubic complexity algorithm.…”
Section: B Monomial Bases and Interpolation Formulamentioning
confidence: 99%
“…The first one, that solves the problem 2, is based on an algorithm proposed in [2]. The second that solve the problem 1 is based on a methodology proposed in [12] and an algorithmic improvement. The global point of view is based relies on classical ideas on Gröbner basis and the reader can refer to [4] for a systematic presentation of the mathematical content used here.One can remark that the problem 2 can be treated by an adaptation of the second algorithm with essencially the same arithmetic coast, even if the modification lead to a more technical presentation.…”
In this paper we describe an algorithm which permits to perfom the erasure list-decoding of q-ary Reed-Muller codes with a quadratic complexity in the dimension of the code rather than with the usual cubic complexity for random linear codes with not too large length. The algorithm is based on a multivariable interpolation algorithm.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.