搜索结果: 1-14 共查到“军事学 Equation”相关记录14条 . 查询时间(0.076 秒)
Finding Small Solutions of the Equation $Bx-Ay=z$ and Its Applications to Cryptanalysis of the RSA Cryptosystem
RSA Cryptanalysis Lattice
2018/6/6
We present two attacks on RSA as its applications. One focuses on the case with known bits of the private exponent together with the prime factor, and the other considers the case with a small differe...
Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems
quantum algorithm Boolean equation solving quantum algebraic attac
2018/1/12
Decision of whether a Boolean equation system has a solution is an NPC problem and finding a solution is NP hard. In this paper, we present a quantum algorithm to decide whether a Boolean equation sys...
Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers
matrices over real numbers affine transformations
2015/12/31
This paper studies the possibility of achieving indistinguishabilitybased
security in privately outsourcing linear equation systems over real numbers.
The particular task is to solve a full-rank n ×...
Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath
polynomial quotient ring SAT solver Rijndael AES
2015/12/29
Methods are presented to derive with the aid of the computer
mathematics software system SageMath the Multivariate Quadratic
equation systems (MQ) for the input and output bit variables of a
crypto...
Security Features of an Asymmetric Cryptosystem based on the Diophantine Equation Hard Problem
Diophantine equation hard problem (DEHP) integer factorization problem asymmetric cryptography
2012/3/26
The Diophantine Equation Hard Problem (DEHP) is a potential cryptographic problem on the Diophantine equation $U=\sum \limits_{i=1}^n {V_i x_{i}}$. A proper implementation of DEHP would render an atta...
Cryptanalysis of the $AA_{\beta}$ Cryptosystem based on Linear Diophantine Equation Discrete Log Problem
Public-Key Cryptosystem linear diophantine equation discrete log problem
2011/7/25
Very recently, Ariffin and Abu proposed a new version of the $AA_{\beta}$ cryptosystem based on linear diophantine equation discrete log problem. However, we give an efficient simple ciphertext-only a...
Number formula and degree level of ergodic polynomial functions over $\mathbb{Z}$/$2^{n}\mathbb{Z}$ and generalized result of linear equation on ergodic power-series T-Function
T-function ergodic polynomial ergodic power-series
2010/9/29
In this paper, using Anashin's general theory, some detail combinatorial result of stirling numbers and Larin's result , we can give the counting formula for the given degree polynomial ergodic(single...
Enhanced STS using Check Equation --Extended Version of the Signature scheme proposed in the PQCrypt2010--
Multivariate Public Key Cryptosystem Digital Signature Stepwise Triangular Scheme Check Equation
2010/9/14
We propose solutions to the problems which has been left in the Enhanced STS, which was proposed in the PQCrypto 2010. Enhanced STS signature scheme is de ned as the public key with the Complementary ...
Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems
public-key cryptography algebraic attacks graph partitioning polynomial equations Trivium QUAD
2010/7/14
We present a novel approach for solving systems of polynomial equations via graph partitioning. The concept of a variable-sharing graph of a system of polynomial equations is defined. If such graph is...
Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers
Characteristic set proper triangular set finite field
2010/1/18
Efficient characteristic set methods for computing solutions of a polynomial
equation system in a finite field are proposed. We introduce the concept of proper
triangular sets and prove that proper ...
New Technique for Solving Sparse Equation Systems.
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems
multivariate public key cryptosystem quadratic polynomial algebraic cryptanalysis
2008/12/22
In the CT-track of the 2006 RSA conference, a new multivariate
public key cryptosystem, which is called the Medium Field Equation
(MFE) multivariate public key cryptosystem, is proposed by Wang,
Ya...
A PUBLIC KEY CRYPTOSYSTEM BASED ON PELL EQUATION
Pell’s Equation Public key cryptosystem RSA scheme KMOV scheme
2008/11/26
RSA type public key cryptosystems based on the Pell’s
equation are proposed in the honor of an Indian mathematician Brahmgupta
who studied Pell’s equation long before European mathematicians
came t...
Let N = pq be an RSA modulus where p, q are large primes of the same
bitsize.