当前位置: X-MOL 学术Appl. Algebra Eng. Commun. Comput. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Why you cannot even hope to use Ore algebras in Cryptography
Applicable Algebra in Engineering, Communication and Computing ( IF 0.7 ) Pub Date : 2021-01-30 , DOI: 10.1007/s00200-021-00493-9
Michela Ceria , Teo Mora , Andrea Visconti

We adapt tag-variables and Buchberger reduction in order, given two elements, \(pg\in R\) into an effective ring R, to express g as the evaluation of a polynomial \(f(X)\in R[X]\) at p, \(g=f(p)\). As a by-product, we present also an attack to a couple of Cryptographical protocols.



中文翻译:

为什么您甚至不希望在密码学中使用矿石代数

在给定有效环R的两个元素\(pg \ in R \)中,我们依次调整了变量变量和Buchberger归约,以将g表示为多项式\(f(X)\ in R [X]的求值\)p\(g = f(p)\)。作为副产品,我们还提出了对几个密码协议的攻击。

更新日期:2021-01-31
down
wechat
bug