comparison of the usual algorithm for solving the PoSSo problem and Algorithm 16, the proposed algorithm Computation with FGb on a 3, p.100 ,
f s ) in graduation d w.r.t, p.42 ,
51 11 Polynomial systems solving, 62 12 Solving polynomial systems admitting polynomial change of variables, p.70 ,
A subexponential algorithm for discrete logarithms over all finite fields, Advances in Cryptology?CRYPTO'93, pp.147-158, 1994. ,
A subexponential algorithm for discrete logarithms over the rational subgroup of the jacobians of large genus hyper-elliptic curves over finite fields, Algorithmic Number Theory 6th International Symposium, 1994. ,
Counting rational points on curves and abelian varieties over finite fields, Algorithmic Number Theory, pp.1-16 ,
Étude des Systèmes Algébriques Surdéterminés Applications aux Codes Correcteurs et à la Cryptographie, 2004. ,
The Magma Algebra System I: The User Language, Journal of Symbolic Computation, vol.24, issue.3-4, pp.3-4235, 1997. ,
DOI : 10.1006/jsco.1996.0125
Hybrid approach for solving multivariate systems over finite fields, Journal of Mathematical Cryptology, vol.3, issue.3, pp.177-197, 2009. ,
DOI : 10.1515/JMC.2009.009
URL : https://hal.archives-ouvertes.fr/hal-01148127
Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic. Designs, Codes and Cryptography, pp.1-52, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00776072
On the complexity of gröbner basis computation of semi-regular overdetermined algebraic equations, International Conference on Polynomial System Solving -ICPSS, pp.71-75, 2004. ,
On the complexity of solving quadratic Boolean systems, Journal of Complexity, vol.29, issue.1, pp.53-75, 2013. ,
DOI : 10.1016/j.jco.2012.07.001
URL : https://hal.archives-ouvertes.fr/hal-00655745
Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems, Algebraic Geometry Conference, pp.1-14, 2005. ,
A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic, 2013. ,
DOI : 10.1007/978-3-642-55220-5_1
URL : https://hal.archives-ouvertes.fr/hal-00835446
Fast solution of Toeplitz systems of equations and computation of Padé approximants, Journal of Algorithms, vol.1, issue.3, pp.259-295, 1980. ,
Triangular factorization and inversion by fast matrix multiplication, Mathematics of Computation, vol.28, issue.125, pp.231-236, 1974. ,
DOI : 10.1090/S0025-5718-1974-0331751-8
Explicit-Formulas Database ,
Faster addition and doubling on elliptic curves, Advances in Cryptology : ASIACRYPT 2007, pp.29-50, 2007. ,
Factoring integers with the number field sieve, Lecture Notes in Mathematics, vol.32, issue.107, pp.50-94, 1993. ,
DOI : 10.1109/TIT.1986.1057137
Fast modular transforms, Journal of Computer and System Sciences, vol.8, issue.3, pp.366-386, 1974. ,
DOI : 10.1016/S0022-0000(74)80029-2
The shape of the Shape Lemma, Proceedings of the international symposium on Symbolic and algebraic computation , ISSAC '94, pp.129-133, 1994. ,
DOI : 10.1145/190347.190382
A deterministic algorithm for sparse multivariate polynomial interpolation, Proceedings of the twentieth annual ACM symposium on Theory of computing , STOC '88, pp.301-309, 1988. ,
DOI : 10.1145/62212.62241
A zerodimensional Gröbner basis for AES-128, Fast Software Encryption, pp.78-88, 2006. ,
Mohab Safey El Din, and Éric Schost. A baby step-giant step roadmap algorithm for general algebraic sets. CoRR, abs/1201, 2012. ,
The complexity of partial derivatives. Theoretical computer science, pp.317-330, 1983. ,
A criterion for detectingm-regularity, Inventiones Mathematicae, vol.10, issue.8, pp.1-11, 1987. ,
DOI : 10.1007/BF01389151
lexicographic order, Duke Mathematical Journal, vol.55, issue.2, pp.321-328, 1987. ,
DOI : 10.1215/S0012-7094-87-05517-7
Fast Algorithms for Zero-Dimensional Polynomial Systems using Duality, Applicable Algebra in Engineering, Communication and Computing, vol.14, issue.4, pp.239-272, 2003. ,
DOI : 10.1007/s00200-003-0133-5
URL : https://hal.archives-ouvertes.fr/inria-00072296
Ein Algorithmus zum Auffinden der Basiselemente des Restklassenrings nach einem nulldimensionalen Polynomideal, 1965. ,
Bruno Buchberger???s PhD thesis 1965: An algorithm for finding the basis elements of the residue class ring of a zero dimensional polynomial ideal, Journal of Symbolic Computation, vol.41, issue.3-4, pp.3-4475, 2006. ,
DOI : 10.1016/j.jsc.2005.09.007
Computing Roadmaps of General Semi-Algebraic Sets, The Computer Journal, vol.36, issue.5, pp.504-514, 1993. ,
DOI : 10.1093/comjnl/36.5.504
Sequences of numbers generated by addition in formal groups and new primality and factorization tests, Advances in Applied Mathematics, vol.7, issue.4, pp.385-434, 1986. ,
Some Tapas of Computer Algebra. Algorithms and Computation in Mathematics Series, 2011. ,
Handbook of elliptic and hyperelliptic curve cryptography, 2005. ,
DOI : 10.1201/9781420034981
Invariants of Finite Groups Generated by Reflections, American Journal of Mathematics, vol.77, issue.4, pp.778-782, 1955. ,
DOI : 10.2307/2372597
On fast multiplication of polynomials over arbitrary algebras, Acta Inf, vol.28, issue.7, pp.693-701, 1991. ,
Galois invariant smoothness basis. Series on Number Theory and Its Applications, pp.142-167, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-00373511
Ideals, Varieties, and Algorithms: an Introduction to Computational Algebraic Geometry and Commutative Algebra, 2007. ,
A course in computational algebraic number theory, 1993. ,
DOI : 10.1007/978-3-662-02945-9
Théorie des Invariants Effective Applications à la Théorie de Galois et à la Résolution de Systèmes Algèbriques. Implantation en Axiom, 1997. ,
Modifications to the Number Field Sieve, Journal of Cryptology, vol.6, issue.3, pp.169-180, 1993. ,
DOI : 10.1007/BF00198464
Algebraic groups and discrete logarithm, Public-key cryptography and computational number theory, pp.17-27, 2001. ,
DOI : 10.1515/9783110881035.17
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.5372
Prime numbers: a computational perspective, 2005. ,
Universality of Nash equilibria, Mathematics of Operations Research, vol.28, issue.3, pp.424-432, 2003. ,
Some Tapas of Computer Algebra, chapter Gröbner Bases for Codes, Algorithms and Computation in Mathematics Series [CCS11], 2011. ,
Edwards model of elliptic curves defined over any fields. Cryptology ePrint Archive, 2012. ,
LINBOX: A GENERIC LIBRARY FOR EXACT LINEAR ALGEBRA, Mathematical Software, pp.40-50, 2002. ,
DOI : 10.1142/9789812777171_0005
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
An Index Calculus Algorithm for Plane Curves of Small Degree, Algorithmic number theory ANTS-VII, pp.543-557, 2006. ,
DOI : 10.1007/11792086_38
On the discrete logarithm problem in class groups of curves, Mathematics of Computation, vol.80, issue.273, pp.443-475, 2011. ,
DOI : 10.1090/S0025-5718-2010-02281-1
Abstract, Compositio Mathematica, vol.6, issue.01, pp.75-104, 2011. ,
DOI : 10.1112/S0010437X10005075
Efficient Scalar Multiplication by Isogeny Decompositions, Public Key Cryptography-PKC 2006, pp.191-206, 2006. ,
DOI : 10.1007/11745853_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.2150
Computational invariant theory, 2002. ,
DOI : 10.1007/978-3-662-48422-7
Index Calculus in Class Groups of Non-hyperelliptic Curves of Genus Three, Journal of Cryptology, vol.38, issue.192, pp.593-611, 2008. ,
DOI : 10.1007/s00145-007-9014-6
URL : https://hal.archives-ouvertes.fr/inria-00107290
Improving the arithmetic of elliptic curves in the Jacobi model, Information Processing Letters, vol.104, issue.3, pp.101-105, 2007. ,
DOI : 10.1016/j.ipl.2007.05.012
URL : https://hal.archives-ouvertes.fr/lirmm-00145805
A normal form for elliptic curves, In Bulletin of the American Mathematical Society, vol.44, pp.393-422, 2007. ,
A general framework for subexponential discrete logarithm algorithms, Acta Arithmetica, vol.102, issue.1, pp.83-103, 2002. ,
DOI : 10.4064/aa102-1-6
URL : https://hal.archives-ouvertes.fr/inria-00512717
An L (1/3???+?????) Algorithm for the Discrete Logarithm Problem for Low Degree Curves, Advances in Cryptology-EUROCRYPT 2007, pp.379-393, 2007. ,
DOI : 10.1007/978-3-540-72540-4_22
URL : https://hal.archives-ouvertes.fr/inria-00135324
Commutative Algebra with a View Toward Algebraic Geometry, 1995. ,
A new efficient algorithm for computing Gröbner bases (F4), Journal of Pure and Applied Algebra, vol.139, pp.1-361, 1999. ,
A new efficient algorithm for computing Gröbner bases without reduction to zero (F5), Proceedings of the 2002 international symposium on Symbolic and algebraic computation, ISSAC '02, pp.75-83, 2002. ,
FGb: A Library for Computing Gr??bner Bases, Mathematical Software -ICMS 2010, pp.84-87, 2010. ,
DOI : 10.1007/978-3-642-15582-6_17
Fast change of ordering with exponent ??, ACM Communications in Computer Algebra, vol.46, issue.3/4, pp.92-93, 2012. ,
DOI : 10.1145/2429135.2429149
Using symmetries and fast change of ordering in the index calculus for elliptic curves discrete logarithm, SCC '12: Proceedings of the Third International Conference on Symbolic Computation and Cryptography, pp.113-118, 2012. ,
Polynomial systems solving by fast linear algebra, 2013. ,
Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm, Journal of Cryptology, vol.32, issue.1, pp.1-41 ,
DOI : 10.1007/s00145-013-9158-5
Efficient Computation of Zero-dimensional Gr??bner Bases by Change of Ordering, Journal of Symbolic Computation, vol.16, issue.4, pp.329-344, 1993. ,
DOI : 10.1006/jsco.1993.1051
Polynomial evaluation via the division algorithm the fast Fourier transform revisited, Proceedings of the fourth annual ACM symposium on Theory of computing , STOC '72, pp.88-93, 1972. ,
DOI : 10.1145/800152.804900
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gr??bner Bases, Advances in Cryptology -CRYPTO 2003, pp.44-60, 2003. ,
DOI : 10.1007/978-3-540-45146-4_3
Nondeterministic Algorithms, Journal of the ACM, vol.14, issue.4, pp.636-644, 1967. ,
DOI : 10.1145/321420.321422
Computing modular correspondences for abelian varieties, ISSAC '11: Proceedings of the 2011 international symposium on Symbolic and algebraic computation, pp.248-277, 2011. ,
DOI : 10.1016/j.jalgebra.2011.06.031
Sparse FGLM algorithms, Journal of Symbolic Computation, vol.80, 2013. ,
DOI : 10.1016/j.jsc.2016.07.025
Twisted jacobi intersections curves Theory and Applications of Models of Computation [FP09] Jean-Charles Faugère and Ludovic Perret. An efficient algorithm for decomposing multivariate polynomials and its applications to cryptography, Journal of Symbolic Computation, issue.12, pp.199-210, 2009. ,
Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields, Advances in Cryptology EUROCRYPT 2012, pp.27-44, 2012. ,
DOI : 10.1007/978-3-642-29011-4_4
Solving systems of polynomial equations with symmetries using SAGBI-Gröbner bases, ISSAC '09: Proceedings of the 2009 international symposium on Symbolic and algebraic computation, ISSAC '09, pp.151-158, 2009. ,
Applications of Arithmetical Geometry to Cryptographic Constructions, International Conference on Finite Fields and Applications, pp.128-161, 2001. ,
DOI : 10.1007/978-3-642-56755-1_13
Gröbner bases of ideals invariant under a commutative group: the non-modular case, ISSAC, pp.347-354, 2013. ,
Gr??bner bases of bihomogeneous ideals generated by polynomials of bidegree <mml:math altimg="si1.gif" display="inline" overflow="scroll" xmlns:xocs="http://www.elsevier.com/xml/xocs/dtd" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.elsevier.com/xml/ja/dtd" xmlns:ja="http://www.elsevier.com/xml/ja/dtd" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:tb="http://www.elsevier.com/xml/common/table/dtd" xmlns:sb="http://www.elsevier.com/xml/common/struct-bib/dtd" xmlns:ce="http://www.elsevier.com/xml/common/dtd" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:cals="http://www.elsevier.com/xml/common/cals/dtd"><mml:mrow><mml:mo>(</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo>)</mml:mo></mml:mrow></mml:math>: Algorithms and complexity, Journal of Symbolic Computation, vol.46, issue.4, pp.406-437, 2011. ,
DOI : 10.1016/j.jsc.2010.10.014
On the complexity of the generalized MinRank problem, Journal of Symbolic Computation, vol.55, pp.30-58, 2013. ,
DOI : 10.1016/j.jsc.2013.03.004
Mohab Safey El Din, and Thibaut Verron. On the complexity of computing Gröbner bases for quasi-homogeneous systems, ISSAC, pp.189-196, 2013. ,
Algorithmes de calcul de base standards ,
A propos du th??or??me de pr??paration de weierstrass, 1973. ,
DOI : 10.1090/S0002-9947-1968-0217093-3
Index calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problem, Journal of Symbolic Computation, vol.44, issue.12, pp.1690-1702, 2009. ,
DOI : 10.1016/j.jsc.2008.08.005
URL : https://hal.archives-ouvertes.fr/inria-00337631
Gr??bner Bases, Invariant Theory and Equivariant Dynamics, Journal of Symbolic Computation, vol.28, issue.1-2, pp.275-302, 1999. ,
DOI : 10.1006/jsco.1998.0277
URL : http://doi.org/10.1006/jsco.1998.0277
On the Function Field Sieve and the Impact of Higher Splitting Probabilities, Cryptology ePrint Archive, 2013. ,
DOI : 10.1007/978-3-642-40084-1_7
On Multivariate Polynomial Decomposition, Applicable Algebra in Engineering, Communication and Computing, vol.14, issue.1, pp.11-31, 2003. ,
DOI : 10.1007/978-3-642-60218-4_35
Constructive and destructive facets of Weil descent on elliptic curves, Applied Algebra, Algebraic Algorithms and Error Correcting Codes, Proceedings of AAECC-5, pp.19-46, 2002. ,
DOI : 10.1007/s00145-001-0011-x
URL : https://hal.archives-ouvertes.fr/inria-00512763
Deciding reachability of the infimum of a multivariate polynomial, Proceedings of the 36th international symposium on Symbolic and algebraic computation, ISSAC '11, pp.131-138, 2011. ,
DOI : 10.1145/1993886.1993910
URL : https://hal.archives-ouvertes.fr/hal-00744469
Genus 2 point counting over prime fields, Journal of Symbolic Computation, vol.47, issue.4, pp.368-400, 2012. ,
DOI : 10.1016/j.jsc.2011.09.003
URL : https://hal.archives-ouvertes.fr/inria-00542650
A double large prime variation for small genus hyperelliptic index calculus, Mathematics of Computation, vol.76, issue.257, pp.475-492, 2007. ,
DOI : 10.1090/S0025-5718-06-01900-4
URL : https://hal.archives-ouvertes.fr/inria-00000897
Computing relations in divisor class groups of algebraic curves over finite fields, 2004. ,
Counting Points on Curves over Finite Fields, Journal of Symbolic Computation, vol.25, issue.1, pp.1-21, 1998. ,
DOI : 10.1006/jsco.1997.0164
NTRU: A ring-based public key cryptosystem, Algorithmic Number Theory, pp.267-288, 1998. ,
DOI : 10.1007/BFb0054868
A simple Hankel interpretation of the Berlekamp-Massey algorithm, Linear Algebra and its Applications, vol.125, pp.65-76, 1989. ,
DOI : 10.1016/0024-3795(89)90032-3
Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite Fields, Advances in Cryptology ? EUROCRYPT 2013, pp.177-193, 2013. ,
DOI : 10.1007/978-3-642-38348-9_11
A new index calculus algorithm with complexity L(1/4 + o(1)) in very small characteristic, Cryptology ePrint Archive, 2013. ,
Cover and Decomposition Index Calculus on Elliptic Curves Made Practical, Advances in Cryptology ? EUROCRYPT 2012, pp.9-26, 2012. ,
DOI : 10.1007/978-3-642-29011-4_3
URL : https://hal.archives-ouvertes.fr/hal-01121942
Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields, Journal of Cryptology, vol.12, issue.3, pp.119-143, 2013. ,
DOI : 10.1007/s00145-011-9116-z
Reflection Groups and Invariant Theory, 2001. ,
DOI : 10.1007/978-1-4757-3542-0
Fast algorithms for the characteristics polynomial, Theoretical Computer Science, vol.36, pp.309-317, 1985. ,
DOI : 10.1016/0304-3975(85)90049-0
Improved sparse multivariate polynomial interpolation algorithms, Symbolic and Algebraic Computation, pp.467-474, 1989. ,
DOI : 10.1007/3-540-51084-2_44
Elliptic curve cryptosystems, Mathematics of Computation, vol.48, issue.177, pp.203-209, 1987. ,
DOI : 10.1090/S0025-5718-1987-0866109-5
Hyperelliptic cryptosystems, Journal of Cryptology, vol.2, issue.4, pp.139-150, 1989. ,
DOI : 10.1007/BF02252872
On the complexity of computing a Gröbner basis for the radical of a zero dimensional ideal, Proceedings of the twenty-second annual ACM symposium on Theory of computing, STOC '90, pp.555-563, 1990. ,
Gr??bner bases, Gaussian elimination and resolution of systems of algebraic equations, Computer Algebra, pp.146-156, 1983. ,
DOI : 10.1007/3-540-12868-9_99
Solving zero-dimensional algebraic systems, Journal of Symbolic Computation, vol.13, issue.2, pp.117-131, 1992. ,
DOI : 10.1016/S0747-7171(08)80086-7
Factoring integers with elliptic curves, Annals of mathematics, pp.649-673, 1987. ,
On the complexity of zero-dimensional algebraic systems, Effective methods in algebraic geometry, p.217, 1991. ,
On the decoding of cyclic codes using Gröbner bases Applicable Algebra in Engineering, Communication and Computing, vol.8, issue.6, pp.469-483, 1997. ,
The Algebraic Theory of Modular Systems. Cambridge Mathematical Library, 1994. ,
Shift-register synthesis and bch decoding. Information Theory, IEEE Transactions on, vol.15, issue.1, pp.122-127, 1969. ,
Fast modular transforms via division, 13th Annual Symposium on Switching and Automata Theory (swat 1972), pp.90-96, 1972. ,
DOI : 10.1109/SWAT.1972.5
Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption, Advances in Cryptology ? EUROCRYPT '88, pp.419-453, 1988. ,
DOI : 10.1007/3-540-45961-8_39
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.2397
Use of elliptic curves in cryptography In Lecture notes in computer sciences; 218 on Advances in cryptology?CRYPTO 85, pp.417-426, 1986. ,
Speeding the Pollard and elliptic curve methods of factorization, Mathematics of computation, vol.48, issue.177, pp.243-264, 1987. ,
Solving Polynomial Systems over Finite Fields, 2013. ,
URL : https://hal.archives-ouvertes.fr/tel-01110887
Reducing elliptic curve logarithms to logarithms in a finite field. Information Theory, IEEE Transactions on, vol.39, issue.5, pp.1639-1646, 1993. ,
Asymptotic acceleration of solving multivariate polynomial systems of equations, Proceedings of the thirtieth annual ACM symposium on Theory of computing , STOC '98, pp.488-496, 1998. ,
DOI : 10.1145/276698.276862
Autour de la fonction de Hilbert-Samuel (escaliers d'ideaux polynomiaux), 1991. ,
Degrevlex Gr??bner bases of generic complete intersections, Journal of Pure and Applied Algebra, vol.180, issue.3, pp.263-283, 2003. ,
DOI : 10.1016/S0022-4049(02)00297-9
Reducing elliptic curve logarithms to logarithms in a finite field, Proceedings of the twenty-third annual ACM symposium on Theory of computing, STOC '91, pp.80-89, 1991. ,
Handbook of Applied Cryptography, 2010. ,
Decomposed attack for the jacobian of a hyperelliptic curve over an extension field, Algorithmic Number Theory ,
Univariate polynomials: Nearly optimal algorithms for numerical factorization and root-finding, Journal of Symbolic Computation, vol.33, issue.5, pp.701-733, 2002. ,
Nonstandard Borel-Fixed Ideals, 1994. ,
Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt???88, Advances in Cryptology ? CRYPT0' 95, pp.248-261, 1995. ,
DOI : 10.1007/3-540-44750-4_20
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms, Advances in Cryptology ? EUROCRYPT '96, pp.33-48, 1996. ,
DOI : 10.1007/3-540-68339-9_4
An improved algorithm for computing logarithms over< img src=. Information Theory, IEEE Transactions on, vol.24, issue.1, pp.106-110, 1978. ,
Frobenius maps of abelian varieties and finding roots of unity in finite fields, Mathematics of Computation, vol.55, issue.192, pp.745-763, 1990. ,
DOI : 10.1090/S0025-5718-1990-1035941-X
Monte carlo methods for index computation mod p, Math. Comp, vol.32, issue.143, pp.918-924, 1978. ,
On Polynomial Systems Arising from a Weil Descent, Asiacrypt 2012, p.2012 ,
DOI : 10.1007/978-3-642-34961-4_28
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
Fast probabilistic algorithms for verification of polynomial identities, J. ACM, vol.27, issue.4, pp.701-717, 1980. ,
Elliptic curves over finite fields and the computation of square roots mod p, Mathematics of Computation, vol.44, issue.170, pp.483-494, 1985. ,
Evaluation of discrete logarithms in a group of p?torsion points of an elliptic curve in characteristic p. Mathematics of Computation of the, pp.353-356, 1998. ,
Summation polynomials and the discrete logarithm problem on elliptic curves, Cryptology ePrint Archive Report, vol.031, 2004. ,
Class number, a theory of gactorization, and genera, Number Theory Institute (Proc. Sympos, pp.415-440, 1969. ,
Lower Bounds for Discrete Logarithms and Related Problems, Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques, pp.256-266, 1997. ,
DOI : 10.1007/3-540-69053-0_18
The Arithmetic of Elliptic Curves, 2009. ,
The discrete logarithm problem on elliptic curves of trace one, Journal of Cryptology, vol.12, issue.3, pp.193-196, 1999. ,
The Hessian form of an elliptic curve, Cryptographic Hardware and Embedded Systems?CHES 2001, pp.118-125, 2001. ,
Polynomial Invariants of Finite Groups, Research Notes in Mathematics, 1995. ,
Solving multi-homogeneous and determinantal systems. Algorithms -Complexity -Applications ,
URL : https://hal.archives-ouvertes.fr/tel-01110756
Finite unitary reflection groups, Canadian J. Math, vol.6, pp.274-304, 1954. ,
Solving the elliptic curve discrete logarithm problem using Semaev polynomials, Weil descent and Gröbner basis methods ? an experimental study, Cryptology ePrint Archive, vol.596, 2013. ,
Hilbert functions of graded algebras, Advances in Mathematics, vol.28, issue.1, pp.57-83, 1978. ,
Gaussian elimination is not optimal, Numerische Mathematik, vol.13, issue.4, pp.354-356, 1969. ,
DOI : 10.1007/BF02165411
Solving Systems of Polynomial Equations, 2002. ,
DOI : 10.1090/cbms/097
Algorithms in Invariant Theory (Texts and Monographs in Symbolic Computation), 2008. ,
Index Calculus Attack for Hyperelliptic Curves of Small Genus, Advances in Cryptology : ASIACRYPT 2003, pp.75-92, 2003. ,
DOI : 10.1007/978-3-540-40061-5_5
Multiplying matrices faster than coppersmith-winograd, Proceedings of the 44th symposium on Theory of Computing, STOC '12, pp.887-898, 2012. ,
DOI : 10.1145/2213977.2214056
Functional decomposition of polynomials: The tame case, Journal of Symbolic Computation, vol.9, issue.3, pp.281-299, 1990. ,
Functional decomposition of polynomials: The wild case, Journal of Symbolic Computation, vol.10, issue.5, pp.437-452, 1990. ,
Modern Computer Algebra, 2003. ,
Numbers of solutions of equations in finite fields, Bulletin of the American Mathematical Society, vol.55, issue.5, pp.497-508, 1949. ,
DOI : 10.1090/S0002-9904-1949-09219-4
Solving sparse linear equations over finite fields, IEEE Trans. Inf. Theor, vol.32, issue.1, pp.54-62, 1986. ,
Improvement of Faug??re et al.???s Method to Solve ECDLP, IWSEC 2013, p.2013 ,
DOI : 10.1007/978-3-642-41383-4_8
Probabilistic algorithms for sparse polynomials, Symbolic and Algebraic Computation, pp.216-226, 1979. ,
DOI : 10.1007/3-540-09519-5_73
Interpolating polynomials from their values, Journal of Symbolic Computation, vol.9, issue.3, pp.375-403, 1990. ,
DOI : 10.1016/S0747-7171(08)80018-1
URL : http://doi.org/10.1016/s0747-7171(08)80018-1