We adapt tag-variables and Buchberger reduction in order, given two elements, pg is an element of R into an effective ring R, to express g as the evaluation of a polynomial f(X) is an element of R[X] at p, g=f(p). As a by-product, we present also an attack to a couple of Cryptographical protocols.
Why you cannot even hope to use Ore algebras in Cryptography / M. Ceria, T. Mora, A. Visconti. - In: APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING. - ISSN 0938-1279. - (2021). [Epub ahead of print] [10.1007/s00200-021-00493-9]
Why you cannot even hope to use Ore algebras in Cryptography
M. Ceria
Primo
;A. ViscontiUltimo
2021
Abstract
We adapt tag-variables and Buchberger reduction in order, given two elements, pg is an element of R into an effective ring R, to express g as the evaluation of a polynomial f(X) is an element of R[X] at p, g=f(p). As a by-product, we present also an attack to a couple of Cryptographical protocols.File in questo prodotto:
File | Dimensione | Formato | |
---|---|---|---|
WhyCannotHope.pdf
accesso riservato
Tipologia:
Pre-print (manoscritto inviato all'editore)
Dimensione
193.21 kB
Formato
Adobe PDF
|
193.21 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Ceria2021_Article_WhyYouCannotEvenHopeToUseOreAl.pdf
accesso riservato
Tipologia:
Publisher's version/PDF
Dimensione
1.65 MB
Formato
Adobe PDF
|
1.65 MB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.