. Au-préalable, L. On-note-que-les-noyaux-de, and L. Sont, ?n+2D ) En effet, la probabilité que deux sous-espaces aléatoires de dimension d et d ? soient d'intersection de dimension j est d'après le lemme 2 de l'ordre de 2 ?j(n?d?d ? +j) , et donc celle que ces deux sous-espaces soient d'intersection non-nulle est de l'ordre de 2 ?n+d+d ? = O(2 ?n+2D ) Quitte à remplacer ? ++ 2,D (d, d ? ) par son intersection avec la condition ker(L) ? ker(L ? ) = {0} dont la valeur est la même à des termes d'ordre 2 ?n+2D près, nous pouvons donc supposer que cette condition est réalisée, Nous estimons maintenant le nombre ? ++ 2) = n ? r dim(ker(L) ? K) = i dim(ker(L ? ) ? K) = i ? et a, b ? K où ker(L) et ker(L ? ) sont d'intersection zéro. L'intersection I de ker(L) et K est un sous-espace de dimension contenant a : il y a donc

. Choix-pour-un-tel-sous-espace and . De-même, E(d ? , i ? ) choix pour l'intersection I ? de ker(L ? ) et K. Le sous-espace somme des intersections de K avec ker(L) et ker(L ? ) est un sous-espace de dimension i + i ? de K. Le nombre de sous-espaces de dimension n ? r d'intersection I avec ker(L) et I ? avec ker

. Démonstration, Une borne supérieure du nombre cherché est le nombre de sousespaces de dimension n ? r contenant I + I ? . Le nombre de tels sous-espaces est S(n, n ? r) S(n, i + i ? )

. Bibliographie, Étude des systèmes algébriques surdéterminés. Applications aux codes correcteurs et à la cryptographie, 2004.

M. Bardet, J. Faugère, and B. Salvy, On the Complexity of Gröbner Basis Computation of Semi-Regular Overdetermined Algebraic Equations, ICPSS International Conference on Polynomial System Solving, 2004.

A. Barg, Handbook of Coding Theory Complexity Issue in Coding Theory, 1999.

E. Biham, Cryptanalysis of Patarin???s 2-Round Public Key System with S Boxes (2R), EUROCRYPT, pp.408-416, 2000.
DOI : 10.1007/3-540-45539-6_28

O. Billet and H. Gilbert, Cryptanalysis of Rainbow, Lecture Notes in Computer Science, vol.4116, pp.336-347, 2006.
DOI : 10.1007/11832072_23

A. Blokhuis, R. Coulter, M. Henderson, and C. O. Keefe, Permutations amongst the Dembowski-Ostrom Polynomials, Proceedings of the Fifth International Conference on Finite Fields and Applications, pp.37-42, 2001.
DOI : 10.1007/978-3-642-56755-1_4

B. Buchberger, Ein Algorithmus zum Auffinden der Basiselemente des Restklassnringes nach einem nulldimensionalen Polynomideal, 1965.

B. Buchberger, Ein algorithmisches Kriterium f??r die L??sbarkeit eines algebraischen Gleichungssystems, Aequationes Mathematicae, vol.95, issue.3, pp.374-383, 1970.
DOI : 10.1007/BF01844169

B. Buchberger, A criterion for detecting unnecessary reductions in the construction of Gr??bner-bases, Lecture Notes in Computer Science, vol.72, pp.3-21, 1979.
DOI : 10.1007/3-540-09519-5_52

J. J. Cade, A Public Key Cipher which allows Signatures, 2nd SIAM Conference on Applied Linear Algebra, 1985.

J. J. Cade, A Modification of a Broken Public-Key Cipher, Lecture Notes in Computer Science, vol.263, pp.64-83, 1986.
DOI : 10.1007/3-540-47721-7_6

F. Chabaud and J. Stern, The cryptographic security of the syndrome decoding problem for rank distance codes, Lecture Notes in Computer Science, vol.1163, pp.368-381, 1996.
DOI : 10.1007/BFb0034862

W. Y. Chen and G. Rota, q-Analogs of the inclusion- exclusion principle and permutations with restricted position, Discrete Mathematics, vol.104, issue.1, pp.7-22, 1992.
DOI : 10.1016/0012-365X(92)90622-M

S. Collart, M. Kalkbrener, and D. Mall, Converting Bases with the Gr??bner Walk, Journal of Symbolic Computation, vol.24, issue.3-4, pp.465-469, 1997.
DOI : 10.1006/jsco.1996.0145

D. Coppersmith, J. Stern, and S. Vaudenay, The security of the birational permutation signature schemes, Journal of Cryptology, vol.21, issue.no. 5, pp.207-221, 1997.
DOI : 10.1007/s001459900028

N. Courtois, La sécurité des primitives cryptographiques basées sur des problèmes algébriques multivariables, 2001.

N. Courtois, The Security of Hidden Field Equations (HFE), Lecture Notes in Computer Science, vol.2020, pp.266-281, 2001.
DOI : 10.1007/3-540-45353-9_20

N. Courtois, M. Finiasz, and N. Sendrier, How to Achieve a McEliece-Based Digital Signature Scheme, Lecture Notes in Computer Science, vol.2248, pp.157-174, 2001.
DOI : 10.1007/3-540-45682-1_10

URL : https://hal.archives-ouvertes.fr/inria-00072511

N. Courtois, A. Klimov, J. Patarin, and A. Shamir, Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations, EUROCRYPT, pp.392-407, 2000.
DOI : 10.1007/3-540-45539-6_27

J. Ding, A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation, Public Key Cryptography, pp.305-318, 2004.
DOI : 10.1007/978-3-540-24632-9_22

J. Ding and J. E. Gower, Inoculating Multivariate Schemes Against Differential Attacks, Lecture Notes in Computer Science, vol.3958, pp.290-301, 2006.
DOI : 10.1007/11745853_19

J. Ding, J. E. Gower, D. Schmidt, C. Wolf, and Z. Yin, Complexity Estimates for the F 4 Attack on the Perturbed Matsumoto-Imai Cryptosystem, Lecture Notes in Computer Science, vol.3796, pp.262-277, 2005.
DOI : 10.1007/11586821_18

J. Ding and D. Schmidt, Cryptanalysis of HFEv and Internal Perturbation of HFE, Public Key Cryptography, pp.288-301, 2005.
DOI : 10.1007/978-3-540-30580-4_20

J. Ding and D. Schmidt, Rainbow, a New Multivariable Polynomial Signature Scheme, ACNS, pp.164-175, 2005.
DOI : 10.1007/11496137_12

J. Ding, D. Schmidt, and Z. Yin, Cryptanalysis of the new TTS scheme in CHES 2004, International Journal of Information Security, vol.10, issue.3, pp.231-240, 2004.
DOI : 10.1007/s10207-006-0003-9

V. Dubois, P. Fouque, A. Shamir, and J. Stern, Practical Cryptanalysis of SFLASH, Lecture Notes in Computer Science, vol.4622, pp.1-12, 2007.
DOI : 10.1007/978-3-540-74143-5_1

URL : https://hal.archives-ouvertes.fr/inria-00556691

V. Dubois, P. Fouque, and J. Stern, Cryptanalysis of SFLASH with Slightly Modified??Parameters, Proceedings of Eurocrypt 2007, volume LNCS 4515, pp.264-275, 2007.
DOI : 10.1007/978-3-540-72540-4_15

URL : https://hal.archives-ouvertes.fr/inria-00556692

V. Dubois, L. Granboulan, and J. Stern, An Efficient Provable Distinguisher for HFE, Lecture Notes in Computer Science, vol.4052, issue.2, pp.156-167, 2006.
DOI : 10.1007/11787006_14

V. Dubois, L. Granboulan, and J. Stern, Cryptanalysis of HFE with Internal Perturbation, Proceedings of PKC 2007, volume LNCS 4450, pp.249-265, 2007.
DOI : 10.1007/978-3-540-71677-8_17

D. Estes, L. M. Adleman, K. Kompella, K. S. Mccurley, and G. L. Miller, Breaking the Ong-Schnorr-Shamir Signature Scheme for Quadratic Number Fields, Lecture Notes in Computer Science, vol.218, pp.3-13, 1985.
DOI : 10.1007/3-540-39799-X_1

J. Faugère, P. M. Gianni, D. Lazard, and T. Mora, Efficient Computation of Zero-dimensional Gr??bner Bases by Change of Ordering, Journal of Symbolic Computation, vol.16, issue.4, pp.329-344, 1993.
DOI : 10.1006/jsco.1993.1051

J. Faugère and A. Joux, Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gr??bner Bases, Lecture Notes in Computer Science, vol.2729, pp.44-60, 2003.
DOI : 10.1007/978-3-540-45146-4_3

J. Faugère and L. Perret, Cryptanalysis of 2R??? Schemes, Lecture Notes in Computer Science, vol.4117, pp.357-372, 2006.
DOI : 10.1007/11818175_21

J. Faugère and L. Perret, Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects, Lecture Notes in Computer Science, vol.4004, pp.30-47, 2006.
DOI : 10.1007/11761679_3

J. Faugère, A new efficient algorithm for computing Gr??bner bases (F4), Journal of Pure and Applied Algebra, vol.139, issue.1-3, pp.61-88, 1999.
DOI : 10.1016/S0022-4049(99)00005-5

J. Faugère, A New Efficient Algorithm for Computing Gröbner Bases without Reductions to Zero F 5, ISSAC, pp.75-83, 2002.

P. Felke, On the Affine Transformations of HFE-Cryptosystems and Systems with Branches, Lecture Notes in Computer Science, vol.3969, pp.229-241, 2005.
DOI : 10.1007/11779360_19

H. J. Fell and W. Diffie, Analysis of a Public Key Approach Based on Polynomial Substitution, Lecture Notes in Computer Science, vol.218, pp.340-349, 1985.
DOI : 10.1007/3-540-39799-X_24

S. Finch, Mathematical Constants, pp.354-361, 2003.
DOI : 10.1017/CBO9780511550447

P. Fouque, L. Granboulan, and J. Stern, Differential Cryptanalysis for Multivariate Schemes, Lecture Notes in Computer Science, vol.3494, pp.341-353, 2005.
DOI : 10.1007/11426639_20

URL : https://hal.archives-ouvertes.fr/inria-00563961

M. R. Garey and D. S. Johnson, Computer and Intractability : A Guide to the Theory of NP-Completeness, 1979.

W. Geiselmann, R. Steinwandt, and T. Beth, Attacking the Affine Parts of SFLASH, IMA Int. Conf., volume 2260 of Lecture Notes in Computer Science, pp.355-359, 2001.
DOI : 10.1007/3-540-45325-3_31

H. Gilbert and M. Minier, Cryptanalysis of SFLASH, Lecture Notes in Computer Science, vol.2332, pp.288-298, 2002.
DOI : 10.1007/3-540-46035-7_19

J. Goldman and G. Rota, The Number of Subspaces of a Vector Space, Recent Progress in Combinatorics, pp.75-83, 1969.

J. Goldman and G. Rota, On the Foundations of Combinatorial Theory IV Finite Vector Spaces and Eulerian Generating Functions, Studies in Applied Mathematics, vol.71, issue.5, pp.239-258, 1970.
DOI : 10.1002/sapm1970493239

L. Goubin and N. Courtois, Cryptanalysis of the TTM Cryptosystem, Lecture Notes in Computer Science, vol.1976, pp.44-57, 2000.
DOI : 10.1007/3-540-44448-3_4

H. Imai and T. Matsumoto, Algebraic methods for constructing asymmetric cryptosystems, Lecture Notes in Computer Science, vol.229, pp.108-119, 1985.
DOI : 10.1007/3-540-16776-5_713

N. S. James, R. Lidl, and H. Niederreiter, A Cryptanalytic Attack on the Cade Cryptosystem, EUROCRYPT, p.27, 1986.

N. S. James, R. Lidl, and H. Niederreiter, Breaking the Cade Cipher, Lecture Notes in Computer Science, vol.263, pp.60-63, 1986.
DOI : 10.1007/3-540-47721-7_5

J. Faugère, HFE Challenge 1 broken in 96 hours. Announcement that appeared in news ://sci.crypt, 2002.

J. Faugère, Algebraic Cryptanalysis of HFE using Gröbner Bases, 2003.

S. A. Joni and G. Rota, A vector space analog of permutations with restricted position, Journal of Combinatorial Theory, Series A, vol.29, issue.1, pp.59-73, 1980.
DOI : 10.1016/0097-3165(80)90047-3

A. Kipnis, J. Patarin, and L. Goubin, Unbalanced Oil and Vinegar Signature Schemes, EUROCRYPT, pp.206-222, 1999.
DOI : 10.1007/3-540-48910-X_15

A. Kipnis and A. Shamir, Cryptanalysis of the oil and vinegar signature scheme, Lecture Notes in Computer Science, vol.1462, pp.257-266, 1998.
DOI : 10.1007/BFb0055733

A. Kipnis and A. Shamir, Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization, Lecture Notes in Computer Science, vol.1666, pp.19-30, 1999.
DOI : 10.1007/3-540-48405-1_2

D. Lazard, Gr??bner bases, Gaussian elimination and resolution of systems of algebraic equations, Lecture Notes in Computer Science, vol.162, pp.146-156, 1983.
DOI : 10.1007/3-540-12868-9_99

R. Lidl and H. Niederreiter, Finite Fields, volume 20 of Encyclopedia of Mathematics and its applications, 1997.

L. Granboulan, A. Joux, and J. Stern, Inverting HFE Is Quasipolynomial, Lecture Notes in Computer Science, vol.4117, pp.345-356, 2006.
DOI : 10.1007/11818175_20

T. Matsumoto and H. Imai, Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption, EUROCRYPT, pp.419-453, 1988.

T. Matsumoto, H. Imai, H. Harashima, and H. Miyakawa, An Asymmetric Bijective Cryptosystem using a System of Polynomials in Several Indeterminates as a Public Key, Proc. of the 6th Symposium on Information Theory and its Applications, pp.263-268

R. J. Mceliece, A Public-Key Cryptosystem based on Algebraic Coding Theory, JPL DSN Progress Report, pp.114-116, 1978.

T. T. Moh, A Fast Public Key System with Signature and Master Key Functions, Proceedings of CrypTEC'99, International Workshop on Cryptographic Techniques and E-commerce, pp.63-69, 1999.

R. Motwani and P. Raghavan, Randomized Algorithms, pp.67-74, 1995.

H. Ong, C. Schnorr, and A. Shamir, An efficient signature scheme based on quadratic equations, Proceedings of the sixteenth annual ACM symposium on Theory of computing , STOC '84, pp.208-216, 1984.
DOI : 10.1145/800057.808683

H. Ong, C. Schnorr, and A. Shamir, Efficient Signature Schemes Based on Polynomial Equations, CRYPTO, pp.37-46, 1984.

J. Patarin, Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt???88, Lecture Notes in Computer Science, vol.963, pp.248-261, 1995.
DOI : 10.1007/3-540-44750-4_20

J. Patarin, Asymmetric Cryptography with a Hidden Monomial, Lecture Notes in Computer Science, vol.1109, pp.45-60, 1996.
DOI : 10.1007/3-540-68697-5_4

J. Patarin, Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms, EUROCRYPT, pp.33-48, 1996.
DOI : 10.1007/3-540-68339-9_4

J. Patarin, The Oil and Vinegar Signature Scheme, Presented at the Dagstuhl Workshop on Cryptography (transparencies), 1997.

J. Patarin and L. Goubin, Asymmetric cryptography with S-Boxes Is it easier than expected to design efficient asymmetric cryptosystems?, Lecture Notes in Computer Science, vol.1334, pp.369-380, 1997.
DOI : 10.1007/BFb0028492

J. Patarin and L. Goubin, Trapdoor one-way permutations and multivariate polynomials, Lecture Notes in Computer Science, vol.1334, pp.356-368, 1997.
DOI : 10.1007/BFb0028491

J. Patarin, L. Goubin, N. Courtois, and H. C-*-+, C???+* and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai, Lecture Notes in Computer Science, vol.1514, pp.35-49, 1998.
DOI : 10.1007/3-540-49649-1_4

J. Patarin, L. Goubin, and N. Courtois, Improved algorithms for isomorphisms of polynomials, EUROCRYPT, pp.184-200, 1998.
DOI : 10.1007/BFb0054126

L. Perret, A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem, Lecture Notes in Computer Science, vol.3494, pp.354-370, 2005.
DOI : 10.1007/11426639_21

J. M. Pollard and C. Schnorr, An efficient solution of the congruence<tex>x^2 + ky^2 = mpmod{n}</tex>, IEEE Transactions on Information Theory, vol.33, issue.5, pp.702-709, 1987.
DOI : 10.1109/TIT.1987.1057350

A. Shamir, Efficient Signature Schemes Based on Birational Permutations, Lecture Notes in Computer Science, vol.773, pp.1-12, 1993.
DOI : 10.1007/3-540-48329-2_1

J. Zur-gathen and V. Shoup, Computing Frobenius Maps and Factoring Polynomials (Extended Abstract), STOC, pp.97-105, 1992.

B. Yang, J. Chen, and Y. Chen, TTS: High-Speed Signatures on a Low-Cost Smart Card, CHES, pp.371-385, 2004.
DOI : 10.1007/978-3-540-28632-5_27

D. Ye, K. Lam, and Z. Dai, Cryptanalysis of, Lecture Notes in Computer Science, vol.1666, pp.315-325, 1999.