Simultaneous Hardcore Bits and Cryptography against Memory Attacks, Lecture Notes in Computer Science, vol.5444, pp.474-495, 2009. ,
DOI : 10.1007/978-3-642-00457-5_28
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.169.4112
Polly Cracker, revisited, Advances in Cryptology ? ASIACRYPT 2011. full version available as Cryptology ePrint Archive, pp.179-196, 2011. ,
DOI : 10.1007/978-3-642-25385-0_10
URL : https://hal.archives-ouvertes.fr/hal-01112976
New Algorithms for Learning in Presence of Errors, Lecture Notes in Computer Science, vol.6755, pp.403-415, 2011. ,
DOI : 10.1007/978-3-540-85174-5_31
´ Etude des systèmes algébriques surdéterminés Applications aux codes correcteurs etàet`età la cryptographie, 2004. ,
Complexity study of Gröbner basis computation, 2002. ,
On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations, Proc. International Conference on Polynomial System Solving (ICPSS), pp.71-75, 2004. ,
On the Complexity of the F5 Gröbner basis Algorithm, Journal of Symbolic Computation, pp.1-24, 2014. ,
Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems, Proc. of MEGA 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry, 2005. ,
Solving shortest and closest vector problems: The decomposition approach, IACR Cryptology ePrint Archive, p.685, 2013. ,
On the inherent intractability of certain coding problems (Corresp.), IEEE Transactions on Information Theory, vol.24, issue.3, pp.384-386, 1978. ,
DOI : 10.1109/TIT.1978.1055873
Hybrid approach for solving multivariate systems over finite fields, Journal of Mathematical Cryptology, vol.3, issue.3, pp.177-197, 2010. ,
DOI : 10.1515/JMC.2009.009
URL : https://hal.archives-ouvertes.fr/hal-01148127
The Magma Algebra System I: The User Language, Journal of Symbolic Computation, vol.24, issue.3-4, pp.3-4235, 1997. ,
DOI : 10.1006/jsco.1996.0125
Classical hardness of learning with errors, Proceedings of the 45th annual ACM symposium on Symposium on theory of computing, STOC '13, pp.575-584, 2013. ,
DOI : 10.1145/2488608.2488680
URL : https://hal.archives-ouvertes.fr/hal-00922194
Efficient Fully Homomorphic Encryption from (Standard) LWE, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, pp.97-106, 2011. ,
DOI : 10.1109/FOCS.2011.12
Ein Algorithmus zum Auffinden der Basiselemente des Restklassenringes nach einem nulldimensionalen Polynomideal, 1965. ,
Computer algebra symbolic and algebraic computation, ACM SIGSAM Bulletin, vol.16, issue.4, pp.5-5, 1982. ,
DOI : 10.1145/1089310.1089312
Some Algebraic Aspects of the Advanced Encryption Standard, 2006. ,
DOI : 10.1007/11506447_6
Matrix multiplication via arithmetic progressions, Proceedings of the nineteenth annual ACM conference on Theory of computing , STOC '87, pp.251-280, 1990. ,
DOI : 10.1145/28395.28396
URL : http://doi.org/10.1016/s0747-7171(08)80013-2
Ideals, Varieties and Algorithms, 2005. ,
Thin algebras of embedding dimension three, Journal of Algebra, vol.100, issue.1, pp.235-259, 1986. ,
DOI : 10.1016/0021-8693(86)90076-1
A probabilistic remark on algebraic program testing, Information Processing Letters, vol.7, issue.4, pp.192-194, 1978. ,
DOI : 10.1016/0020-0190(78)90067-4
Lossy Codes and a New Variant of the Learning-With-Errors Problem, Lecture Notes in Computer Science, vol.7881, pp.18-34, 2013. ,
DOI : 10.1007/978-3-642-38348-9_2
A new efficient algorithm for computing Gr??bner bases (F4), Journal of Pure and Applied Algebra, vol.139, issue.1-3, pp.61-88, 1999. ,
DOI : 10.1016/S0022-4049(99)00005-5
A new efficient algorithm for computing Gröbner bases without reduction to zero (F5), Proceedings of the 2002 International Symposium on Symbolic and Algebraic Computation ISSAC, pp.75-83, 2002. ,
Françoise Levy dit Vehel, and Ludovic Perret. Cryptanalysis of minrank, Wagner [42], pp.280-296 ,
Efficient Computation of Zero-dimensional Gr??bner Bases by Change of Ordering, Journal of Symbolic Computation, vol.16, issue.4, pp.329-344, 1993. ,
DOI : 10.1006/jsco.1993.1051
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gr??bner Bases, Lecture Notes in Computer Science, vol.2729, pp.44-60, 2003. ,
DOI : 10.1007/978-3-540-45146-4_3
An inequality for Hilbert series of graded algebras., MATHEMATICA SCANDINAVICA, vol.56, pp.117-144, 1985. ,
DOI : 10.7146/math.scand.a-12092
Hilbert Series for Ideals Generated by Generic Forms, Journal of Symbolic Computation, vol.17, issue.2, pp.149-157, 1994. ,
DOI : 10.1006/jsco.1994.1008
Powers of tensors and fast matrix multiplication, International Symposium on Symbolic and Algebraic Computation, pp.296-303, 2014. ,
A fully homomorphic encryption scheme, 2009. ,
Rank-profile revealing Gaussian elimination and the CUP matrix decomposition, Journal of Symbolic Computation, vol.56, pp.46-68, 2013. ,
DOI : 10.1016/j.jsc.2013.04.004
URL : https://hal.archives-ouvertes.fr/hal-00655543
Gröbner-bases, Gaussian elimination and resolution of systems of algebraic equations, Proceedings of the European Computer Algebra Conference on Computer Algebra, 1983. ,
A Public-Key System Based on Algebraic Coding Theory, pp.114-116, 1978. ,
Hardness of SIS and LWE with Small Parameters, Lecture Notes in Computer Science, vol.8042, issue.1, pp.21-39, 2013. ,
DOI : 10.1007/978-3-642-40041-4_2
Public-key cryptosystems from the worst-case shortest vector problem, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.333-342, 2009. ,
DOI : 10.1145/1536414.1536461
A Framework for Efficient and Composable Oblivious Transfer, Wagner [42], pp.554-571 ,
DOI : 10.1007/978-3-540-85174-5_31
On lattices, learning with errors, random linear codes, and cryptography, STOC, pp.84-93, 2005. ,
On lattices, learning with errors, random linear codes, and cryptography, J. ACM, vol.56, issue.6, 2009. ,
Fast Probabilistic Algorithms for Verification of Polynomial Identities, Journal of the ACM, vol.27, issue.4, pp.701-717, 1980. ,
DOI : 10.1145/322217.322225
Sage Mathematics Software Version 6.2. The Sage Development Team, 2013. ,