1996
DOI: 10.1007/bfb0009515
|View full text |Cite
|
Sign up to set email alerts
|

The multi-variable modular polynomial and its applications to cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

1997
1997
2000
2000

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…However, all multivariable-type functions cannot be treated as a single variable. By improving the Håstad theorem, the Håstad attack has been extended to the RSA cryptosystem where the encryption function is a multivariable polynomial [11].…”
Section: Security Against Håstad Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…However, all multivariable-type functions cannot be treated as a single variable. By improving the Håstad theorem, the Håstad attack has been extended to the RSA cryptosystem where the encryption function is a multivariable polynomial [11].…”
Section: Security Against Håstad Attackmentioning
confidence: 99%
“…. , x l in polynomial time of e, k, and log n i : (10) (11) Here N i k n i , n min n i , g is the number of similar terms including the constants, and f is the sum of degrees of x 1 , x 2 , . .…”
Section: Security Against Håstad Attackmentioning
confidence: 99%
“…A few authors have shown that such attacks can be extended to elliptic curve cryptosystems [14,12,20,8]. These attacks are based on division polynomials whose degree e 2 grows quadraticly with the public parameter e. Because of these results and the more complex structure of KMOV, it is sometimes believed that KMOV is more resistant against this kind of attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Their advantage is that they allow us to encrypt data larger than the public-key at a time, and we can prove their security is equivalent to the original RSA cryptosystem or factoring. However, these algorithms are very slow and the attacks against the RSA cryptosystem are also applicable to them (See, for example, [8] [20].). We cannot find significant advantage over using the original RSA cryptosystem for each block.…”
Section: Introductionmentioning
confidence: 99%