Algebraic techniques in differential cryptanalysis, FSE. Lecture Notes in Computer Science, vol.5665, pp.193-208, 2009. ,
Algebraic Precomputations in Differential Cryptanalysis, Information Security and Cryptology: 6th International Conference, pp.1-18, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-01288904
Comparison between XL and Gröbner basis algorithms, Advances in Cryptology ? ASI- ACRYPT 2004, pp.338-353, 2004. ,
DOI : 10.1007/978-3-540-30539-2_24
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.4696
Gröbner Bases -A Computational Approach to Commutative Algebra, 1991. ,
The MAGMA Algebra System I: The User Language, In: Journal of Symbolic Computation, vol.24, pp.235-265, 1997. ,
Practical cryptanalysis of the identification scheme based on the Isomorphism of Polynomial with one secret problem, Public Key Cryptography 2011 of Lecture Notes in Computer Science, 2011. ,
URL : https://hal.archives-ouvertes.fr/inria-00556671
PolyBoRi: A framework for Gröbner-basis computations with Boolean polynomials, Journal of Symbolic Computation, vol.44, issue.9, pp.1326-1345, 2009. ,
DOI : 10.1016/j.jsc.2008.02.017
URL : http://doi.org/10.1016/j.jsc.2008.02.017
Ein Algorithmus zum Auffinden der Basiselemente des Restklassenrings nach einem nulldimensionalen Polynomideal, 1965. ,
Bruno Buchberger's PhD thesis 1965: An algorithm for finding the basis elements of the residue class ring of a zero dimensional polynomial ideal, Journal of Symbolic Computation, vol.41, pp.3-4, 2006. ,
Flexible partial enlargement to accelerate gröner basis computation over F2, Progress in Cryptology ? AFRICACRYPT 2010, pp.69-81, 2010. ,
MutantXL: Solving multivariate polynomial equations for cryptanalysis, Symmetric Cryptography . No. 09031 in Dagstuhl Seminar Proceedings. Schloss Dagstuhl ? Leibniz- Zentrum fuer Informatik, 2009. ,
An Analysis of the XSL Algorithm, Advances in Cryptology ? ASIACRYPT 2005, pp.333-352, 2005. ,
Algebraic Attacks on Stream Ciphers with Linear Feedback, Advances in Cryptology ? EUROCRYPT, 2003. ,
Algebraic Attacks over GF(2**k), Application to HFE Challenge 2 and Sflash-v2, Public Key Cryptography ? PKC, pp.201-217, 2004. ,
DOI : 10.1007/978-3-540-24632-9_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.415.3008
Efficient algorithms for solving overdefined systems of multivariate polynomial equations, Advances in Cryptology ? EUROCRYPT 2000, pp.392-407, 2000. ,
Topics in Cryptology -CT-RSA 2003: The Cryptographers, About the XL algorithm over GF Conference Proceedings. Lecture Notes in Computer Science, vol.2612, issue.2, pp.141-157, 2003. ,
Cryptanalysis of block ciphers with overdefined systems of equations, Advances in Cryptology ? ASI- ACRYPT 2002, pp.267-287, 2002. ,
The XL-algorithm and a conjecture from commutative algebra, Advances in Cryptology ? ASIACRYPT 2004, pp.323-337, 2004. ,
A new efficient algorithm for computing Gröbner basis (F4), Journal of Pure and Applied Algebra, vol.139, pp.1-3, 1999. ,
Cryptanalysis of MinRank, CRYPTO, pp.280-296, 2008. ,
Efficient computation of Zero-Dimensional Gröbner bases by change of ordering, Journal of Symbolic Computation, vol.16, pp.329-344, 1993. ,
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems using Gröbner Bases, Advances in Cryptology ? CRYPTO 2003, pp.44-60, 2003. ,
Parallel Gaussian Elimination for Gröbner bases computations in finite fields, Proceedings of the 4th International Workshop on Parallel and Symbolic Computation. PASCO '10, pp.89-97, 2010. ,
Cryptanalysis of 2R -schemes, Lecture Notes in Computer Science, vol.4117, pp.357-372, 2006. ,
Algebraic cryptanalysis of Curry and Flurry using correlated messages, Inscrypt. Lecture Notes in Computer Science, vol.6151, pp.266-277, 2009. ,
Gröbner Bases, Gaussian Elimination and Resolution of Systems of Algebraic Equations, Proceedings of the European Computer Algebra Conference on Computer Algebra, pp.146-156, 1983. ,
An analysis of XSL applied to BES, FSE. Lecture Notes in Computer Science, vol.4593, pp.242-253, 2007. ,
The Gröbner basis algorithm and subresultant theory, Proceedings of the international symposium on Symbolic and algebraic computation . ISSAC '94, pp.123-128, 1994. ,
Gröbner bases computation and Gaussian elimination, 1995. ,
On the relationship between Involutive basis and Gröbner basis algorithms, RISC-Report, pp.96-120, 1996. ,
MXL3: An efficient algorithm for computing Gröbner bases of zero-dimensional ideals, 12th International Conference on Information Security and Cryptology (ICISC), 2009. ,
MXL2: Solving polynomial equations over GF(2) using an improved mutant strategy, pp.203-215, 2008. ,
Algebraic attack on the MQQ public key cryptosystem, 8th International Conference on Cryptology and Network Security (CANS), pp.392-401, 2009. ,
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two new families of asymmetric algorithms, Advances in Cryptology ? EUROCRYPT '96, pp.33-48, 1996. ,
Unravel XL and its variants, Cryptology ePrint Archive Report, vol.596, 2010. ,