当前位置:
X-MOL 学术
›
Appl. Algebra Eng. Commun. Comput.
›
论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Why you cannot even hope to use Ore algebras in Cryptography
Applicable Algebra in Engineering, Communication and Computing ( IF 0.7 ) Pub Date : 2021-01-30 , DOI: 10.1007/s00200-021-00493-9 Michela Ceria , Teo Mora , Andrea Visconti
中文翻译:
为什么您甚至不希望在密码学中使用矿石代数
更新日期:2021-01-31
Applicable Algebra in Engineering, Communication and Computing ( IF 0.7 ) Pub Date : 2021-01-30 , DOI: 10.1007/s00200-021-00493-9 Michela Ceria , Teo Mora , Andrea Visconti
We adapt tag-variables and Buchberger reduction in order, given two elements, \(pg\in R\) into an effective ring R, to express g as the evaluation of a polynomial \(f(X)\in R[X]\) at p, \(g=f(p)\). As a by-product, we present also an attack to a couple of Cryptographical protocols.
中文翻译:
为什么您甚至不希望在密码学中使用矿石代数
在给定有效环R的两个元素\(pg \ in R \)中,我们依次调整了变量变量和Buchberger归约,以将g表示为多项式\(f(X)\ in R [X]的求值\)在p,\(g = f(p)\)。作为副产品,我们还提出了对几个密码协议的攻击。