Simultaneous Hardcore Bits and Cryptography against Memory Attacks, LNCS, vol.5444, pp.474-495, 2009. ,
DOI : 10.1007/978-3-642-00457-5_28
Algebraic algorithms for LWE problems, ACM Communications in Computer Algebra, vol.49, issue.2, p.1018, 1018. ,
DOI : 10.1145/2815111.2815158
URL : https://hal.archives-ouvertes.fr/hal-01072721
Algebraic Precomputations in Differential and Integral Cryptanalysis, ): Ecrypt II, pp.1-14, 2010. ,
DOI : 10.1007/978-3-642-21518-6_27
On the complexity of the Arora-Ge algorithm against LWE, SCC '12: Proceedings of the 3nd International Conference on Symbolic Computation and Cryptography, Castro-Urdiales (Spain), pp.93-99, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00776434
On the complexity of BKW algorithm against LWE, SCC'12: Proceedings of the 3nd International Conference on Symbolic Computation and Cryptography, Castro-Urdiales (Spain), pp.100-107, 2012. ,
Polly Cracker, Revisited, Advances in Cryptology Asiacrypt 2011, pp.179-196, 2011. ,
DOI : 10.1007/978-3-642-25385-0_10
URL : https://hal.archives-ouvertes.fr/hal-01112976
Lazy Modulus Switching for the BKW Algorithm on LWE, ser. Lecture Notes in Computer Science Buenos Aires, vol.8383, pp.429-445, 2014. ,
DOI : 10.1007/978-3-642-54631-0_25
URL : https://hal.archives-ouvertes.fr/hal-00925187
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions, Public-Key Cryptography PKC 2014, pp.446-464, 2014. ,
DOI : 10.1007/978-3-642-54631-0_26
URL : https://hal.archives-ouvertes.fr/hal-00932382
Polly Cracker, revisited, Designs, Codes and Cryptography, vol.79, issue.2, pp.261-302, 2016. ,
DOI : 10.1007/s10623-015-0048-8
URL : https://hal.archives-ouvertes.fr/hal-01112976
Abstract, Journal of Mathematical Cryptology, vol.9, issue.3, pp.169-203, 2015. ,
DOI : 10.1515/jmc-2015-0016
Thin algebras of embedding dimension three, Journal of Algebra, vol.100, issue.1, pp.235-259, 1986. ,
DOI : 10.1016/0021-8693(86)90076-1
On Constructing Homomorphic Encryption Schemes from Coding Theory, Cryptography and Coding -13th IMA International Conference, pp.23-40978, 2011. ,
DOI : 10.1007/978-3-642-13190-5_2
URL : https://hal.archives-ouvertes.fr/hal-00643774
New Algorithms for Learning in Presence of Errors, ser. LNCS, pp.403-415, 2011. ,
DOI : 10.1007/978-3-540-85174-5_31
Comparison between XL and Gröbner basis algorithms, ser. LNCS, pp.338-353, 2004. ,
DOI : 10.1007/978-3-540-30539-2_24
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.4696
Initial recommendations of long-term secure post-quantum systems A family of fast syndrome based cryptographic hash functions, Progress in Cryptology -Mycrypt 2005, First International Conference on Cryptology in Malaysia, pp.64-83, 2005. ,
Maple 10 Programming Guide, 2005. ,
DOI : 10.1007/978-1-4684-0241-4
URL : http://dx.doi.org/10.1016/s0898-1221(96)90201-1
Efficient methods for conversion and solution of sparse systems of low-degree multivariate polynomials over GF(2) via satsolvers, IACR Cryptology ePrint Archive, vol.2007, p.24024, 2007. ,
Étude des systèmes algébriques surdéterminés. applications aux codes correcteurs et à la cryptographie, 2004. ,
Complexity study of Gröbner basis computation, INRIA, Tech. Rep, 2002. ,
Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems, The Effective Methods in Algebraic Geometry Conference ? MEGA 2005, pp.1-14, 2005. ,
On the complexity of solving quadratic Boolean systems, Journal of Complexity, vol.29, issue.1, pp.53-75, 2013. ,
DOI : 10.1016/j.jco.2012.07.001
URL : https://hal.archives-ouvertes.fr/hal-00655745
Why You Cannot Even Hope to use Gr??bner Bases in Public Key Cryptography: An Open Letter to a Scientist Who Failed and a Challenge to Those Who Have Not Yet Failed, Journal of Symbolic Computation, vol.18, issue.6, pp.497-501, 1994. ,
DOI : 10.1006/jsco.1994.1061
Quasi-Dyadic CFS Signatures, Inscrypt, pp.336-349, 2010. ,
DOI : 10.1007/978-3-642-21518-6_23
URL : https://hal.archives-ouvertes.fr/hal-00870939
Monoidic Codes in Cryptography, ser. Lecture Notes in Computer Science, vol.21, issue.4, pp.179-199, 2011. ,
DOI : 10.1109/TIT.1975.1055449
URL : https://hal.archives-ouvertes.fr/hal-00870943
One-time signature scheme from syndrome decoding over generic error-correcting codes, Journal of Systems and Software, vol.84, issue.2, pp.198-204, 2011. ,
DOI : 10.1016/j.jss.2010.09.016
Strengths and Weaknesses of Quantum Computing, SIAM Journal on Computing, vol.26, issue.5, pp.1510-1523, 1997. ,
DOI : 10.1137/S0097539796300933
Quantum cryptography: Public key distribution and coin tossing, Theoretical Computer Science, vol.560, pp.7-11, 2014. ,
DOI : 10.1016/j.tcs.2014.05.025
QUAD: A Practical Stream Cipher with Provable Security, EUROCRYPT 2006, S. Vaudenay, Ed., ser. LNCS, pp.109-128, 2006. ,
DOI : 10.1007/11761679_8
Reducing Key Length of the McEliece Cryptosystem, Progress in Cryptology -Second International Conference on Cryptology in Africa, pp.77-97, 2009. ,
DOI : 10.1007/BFb0019850
URL : https://hal.archives-ouvertes.fr/hal-01081727
On the inherent intractability of certain coding problems (Corresp.), IEEE Transactions on Information Theory, vol.24, issue.3, pp.384-386, 1978. ,
DOI : 10.1109/TIT.1978.1055873
Attacking and Defending the McEliece Cryptosystem, PQCrypto, ser. LNCS, pp.31-46, 2008. ,
DOI : 10.1007/0-387-34799-2_10
Grover vs.??McEliece, Proceedings, N. Sendrier, Ed., ser. Lecture Notes in Computer Science, vol.6061, pp.73-80978, 2010. ,
DOI : 10.1007/978-3-642-12929-2_6
Post-quantum cryptography, ser Mathematics and Statistics Springer-11649; ZDB-2-SMA, 2009. ,
Really Fast Syndrome-Based Hashing, Progress in Cryptology -AFRICACRYPT 2011 -4th International Conference on Cryptology in Africa, pp.134-152978, 2011. ,
DOI : 10.1007/3-540-45708-9_19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.221.5092
Polynomial-time algorithms for quadratic isomorphism of polynomials: The regular case, Journal of Complexity, vol.31, issue.4 ,
DOI : 10.1016/j.jco.2015.04.001
URL : https://hal.archives-ouvertes.fr/hal-00846041
Cryptanalysis of the TRMS Signature Scheme of PKC???05, Information Security and Cryptology: 4th International Conference, pp.143-155, 2008. ,
DOI : 10.1007/978-3-540-68164-9_10
Solving polynomial systems over finite fields, Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation, ISSAC '12, pp.67-74, 2012. ,
DOI : 10.1145/2442829.2442843
URL : https://hal.archives-ouvertes.fr/hal-00776070
A Traceable Block Cipher, pp.331-346, 2003. ,
DOI : 10.1007/978-3-540-40061-5_21
Analysis of Intermediate Field Systems, 2008. ,
On Building Hash Functions from Multivariate Quadratic Equations, ACISP 07, ser. LNCS, pp.82-95, 2007. ,
DOI : 10.1007/978-3-540-73458-1_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.7766
Noise-tolerant learning, the parity problem, and the statistical query model, 32nd ACM STOC, pp.435-440, 2000. ,
DOI : 10.1145/792538.792543
Frodo, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security , CCS'16, pp.1006-1018, 2016. ,
DOI : 10.1145/2976749.2978425
The Magma Algebra System I: The User Language, Journal of Symbolic Computation, vol.24, issue.3-4, pp.3-4, 1997. ,
DOI : 10.1006/jsco.1996.0125
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem, Public Key Cryptography -PKC 2011, pp.1-12, 2011. ,
DOI : 10.1007/978-3-642-19379-8_29
URL : https://hal.archives-ouvertes.fr/inria-00556671
A family of weak keys in HFE and the corresponding practical key-recovery, Journal of Mathematical Cryptology, vol.5, issue.3-4, pp.247-275, 2012. ,
DOI : 10.1515/jmc.2011.012
GBLA, Proceedings of the ACM on International Symposium on Symbolic and Algebraic Computation, ISSAC '16, 2016. ,
DOI : 10.1145/2930889.2930914
URL : https://hal.archives-ouvertes.fr/hal-01276346
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes, CT-RSA 2005, A. Menezes, Ed., ser. LNCS, pp.29-43, 2005. ,
DOI : 10.1007/978-3-540-30574-3_4
Classical hardness of learning with errors, Proceedings of the 45th annual ACM symposium on Symposium on theory of computing, STOC '13, pp.575-584, 2013. ,
DOI : 10.1145/2488608.2488680
URL : https://hal.archives-ouvertes.fr/hal-00922194
Efficient Fully Homomorphic Encryption from (Standard) LWE, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, pp.97-106, 2011. ,
DOI : 10.1109/FOCS.2011.12
PolyBoRi: A framework for Gr??bner-basis computations with Boolean polynomials, Journal of Symbolic Computation, vol.44, issue.9, pp.1326-1345, 2009. ,
DOI : 10.1016/j.jsc.2008.02.017
Bruno Buchberger???s PhD thesis 1965: An algorithm for finding the basis elements of the residue class ring of a zero dimensional polynomial ideal, Journal of Symbolic Computation, vol.41, issue.3-4, pp.3-4, 2006. ,
DOI : 10.1016/j.jsc.2005.09.007
Computer algebra symbolic and algebraic computation, ACM SIGSAM Bulletin, vol.16, issue.4, pp.5-5, 1982. ,
DOI : 10.1145/1089310.1089312
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack, Progress in Cryptology -AFRICACRYPT 2016 -8th International Conference on Cryptology in Africa Proceedings, D. Pointcheval, A. Nitaj, and T, 2016. ,
DOI : 10.1007/978-3-319-31517-1_2
Hash-based Digital Signature Schemes, pp.35-93978, 2009. ,
DOI : 10.1007/978-3-540-88702-7_3
Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks, ser. LNCS, pp.17-32, 2010. ,
DOI : 10.1007/978-3-642-17401-8_3
The computational complexity of some problems of linear algebra, Journal of Computer and System Sciences, 1999. ,
Xmss: extended hash-based signatures " , Internet Engineering Task Force, Internet-Draft draft-irtf-cfrg-xmss-hash- based-signatures-07, Progress, 66 pp. [Online]. Available, 2016. ,
A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511, IEEE Transactions on Information Theory, vol.44, issue.1, pp.367-378, 1998. ,
DOI : 10.1109/18.651067
Squares of Random Linear Codes, IEEE Transactions on Information Theory, vol.61, issue.3, pp.1159-1173, 2015. ,
DOI : 10.1109/TIT.2015.2393251
URL : https://hal.archives-ouvertes.fr/hal-01261390
Odd-char multivariate Hidden Field Equations, Cryptology ePrint Archive, vol.543, 2008. ,
Report on post-quantum cryptography, NIST, Reasearch report NISTIR 8105, 2003. ,
DOI : 10.6028/NIST.IR.8105
Algebraic cryptanalysis of a quantum money scheme the noise-free case Available: https, IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC'15), Maryland, United States, 2015. ,
Error-correcting pairs for a public-key cryptosystem, CoRR, vol.3647, 1205. ,
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank, ser. LNCS, pp.402-421, 2001. ,
DOI : 10.1007/3-540-45682-1_24
SFLASHv3, a fast asymmetric signature scheme, Cryptology ePrint Archive, Report, vol.211, issue.211, 2003. ,
Algebraic Cryptanalysis of the Data Encryption Standard, Cryptography and Coding, 11th IMA International Conference Proceedings, pp.152-169, 2007. ,
DOI : 10.1007/978-3-540-77272-9_10
On the Security of HFE, HFEv- and Quartz, PKC 2003, Y. Desmedt, Ed., ser. LNCS, pp.337-350, 2003. ,
DOI : 10.1007/3-540-36288-6_25
How to Achieve a McEliece-Based Digital Signature Scheme, pp.157-174, 2001. ,
DOI : 10.1007/3-540-45682-1_10
URL : https://hal.archives-ouvertes.fr/inria-00072511
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations, EUROCRYPT 2000, B. Preneel, Ed., ser. LNCS, pp.392-407, 2000. ,
DOI : 10.1007/3-540-45539-6_27
Distinguisher-based attacks on public-key cryptosystems using Reed???Solomon codes, Designs, Codes and Cryptography, vol.73, issue.2, pp.641-666, 2014. ,
DOI : 10.1007/s10623-014-9967-z
URL : https://hal.archives-ouvertes.fr/hal-01096172
A polynomial time attack against algebraic geometry code based public key cryptosystems, Cryptology ePrint Archive, 2014. ,
DOI : 10.1109/isit.2014.6875072
Polynomial time attack on wild McEliece over quadratic extensions, ser. LNCS, pp.17-39, 2014. ,
DOI : 10.1109/tit.2016.2574841
URL : https://hal.archives-ouvertes.fr/hal-00931774
A Polynomial-Time Attack on the BBCRS Scheme, PKC 2015, ser. LNCS, pp.175-193, 2015. ,
DOI : 10.1007/978-3-662-46447-2_8
URL : https://hal.archives-ouvertes.fr/hal-01104078
Ideals, Varieties and Algorithms, 2005. ,
Efficient Implementations of MQPKS on Constrained Devices, CHES 2012, ser. LNCS, pp.374-389, 2012. ,
DOI : 10.1007/978-3-642-33027-8_22
Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme, Research in Cryptology, Second Western European Workshop, pp.65-77978, 2007. ,
DOI : 10.1007/978-3-540-88353-1_6
Differential Properties of the HFE Cryptosystem, Post-Quantum Cryptography -6th International Workshop, pp.59-75978, 2014. ,
DOI : 10.1007/978-3-319-11659-4_4
Planes of ordern with collineation groups of ordern 2, Mathematische Zeitschrift, vol.7, issue.3, pp.239-258, 1968. ,
DOI : 10.1007/BF01111042
A probabilistic remark on algebraic program testing, Information Processing Letters, vol.7, issue.4, pp.192-194, 1978. ,
DOI : 10.1016/0020-0190(78)90067-4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.391.4508
The XL-Algorithm and a Conjecture from Commutative Algebra, ser. LNCS, pp.323-337, 2004. ,
DOI : 10.1007/978-3-540-30539-2_23
Strong bi-homogeneous bézout theorem and its use in effective real algebraic geometry, CoRR, vol.abs, 2006. ,
Inverting HFE Systems Is Quasi-Polynomial for All Fields, CRYPTO 2011, P. Rogaway, Ed., ser. LNCS, pp.724-742, 2011. ,
DOI : 10.1007/978-3-642-22792-9_41
Rainbow, a New Multivariable Polynomial Signature Scheme, ACNS 05, ser. LNCS, pp.164-175, 2005. ,
DOI : 10.1007/11496137_12
Algebraic Attack on HFE Revisited, Information Security, 11th International Conference, pp.215-227978, 2008. ,
DOI : 10.1007/978-3-540-85886-7_15
Multivariate Public Key Cryptography, pp.193-241, 2009. ,
DOI : 10.1007/978-3-540-88702-7_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.9878
McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks, CRYPTO 2011, P. Rogaway, Ed., ser. LNCS, pp.761-779, 2011. ,
DOI : 10.1007/978-3-642-22792-9_43
Lossy codes and a new variant of the learning-witherrors problem, EUROCRYPT 2013, ser. LNCS, pp.18-34, 2013. ,
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model, CT- RSA, pp.240-251, 2009. ,
DOI : 10.1109/18.850662
Practical Cryptanalysis of SFLASH, CRYPTO 2007, A. Menezes, Ed., ser. LNCS, pp.1-12, 2007. ,
DOI : 10.1007/978-3-540-74143-5_1
URL : https://hal.archives-ouvertes.fr/inria-00556691
The Degree of Regularity of HFE Systems, ASIACRYPT 2010, M. Abe, Ed., ser. LNCS, pp.557-576, 2010. ,
DOI : 10.1007/978-3-642-17373-8_32
An Efficient Provable Distinguisher for HFE, ser. LNCS, pp.156-167, 2006. ,
DOI : 10.1007/11787006_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.74.2984
Lattice Signatures and Bimodal Gaussians, CRYPTO 2013, ser. LNCS, pp.40-56, 2013. ,
DOI : 10.1007/978-3-642-40041-4_3
URL : https://hal.archives-ouvertes.fr/hal-00864298
A survey on signature-based algorithms for computing gröbner bases, Journal of Symbolic Computation, 2016. ,
An extensible sat-solver, Theory and Applications of Satisfiability Testing, 6th International Conference, SAT 2003. Santa Margherita Ligure, Italy ser. Lecture Notes in Computer Science, pp.502-518, 2003. ,
A new efficient algorithm for computing Gr??bner bases (F4), Journal of Pure and Applied Algebra, vol.139, issue.1-3, pp.61-88, 1999. ,
DOI : 10.1016/S0022-4049(99)00005-5
A Distinguisher for High-Rate McEliece Cryptosystems, IEEE Transactions on Information Theory, vol.59, issue.10, pp.6830-6844, 2013. ,
DOI : 10.1109/TIT.2013.2272036
A distinguisher for high rate mceliece cryptosystems, Information Theory Workshop (ITW), pp.282-286, 2011. ,
A polynomialtime key-recovery attack on MQQ cryptosystems Available: https, IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC'15), Maryland, United States, 2015. ,
Cryptanalysis of the Hidden Matrix Cryptosystem, Progress in Cryptology, pp.241-254, 2010. ,
DOI : 10.1007/978-3-642-14712-8_15
Cryptanalysis of MinRank, ser. Lecture Notes in Computer Science, vol.5157, pp.280-296, 2008. ,
DOI : 10.1007/978-3-540-85174-5_16
On enumeration of polynomial equivalence classes and their application to mpkc, Finite Fields and Their Applications, vol.18, issue.2, pp.283-302, 2012. ,
Analysis of the MQQ Public Key Cryptosystem, SCC'10: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography, pp.101-116, 2010. ,
DOI : 10.1007/978-3-642-17619-7_13
Kuala Lumpur (Malaysia), pp.1-14, 2010. ,
Structural cryptanalysis of Mceliece schemes with compact keys Available: https, Designs, Codes and Cryptography, pp.87-112, 2016. ,
A distinguisher for high rate mceliece cryptosystem ? extended abstract, Yet Another Conference on Cryptography, pp.1-4, 2010. ,
Algebraic Cryptanalysis of McEliece Variants with Compact Keys, Proceedings of Eurocrypt 2010, pp.279-298, 2010. ,
DOI : 10.1007/978-3-642-13190-5_14
Algebraic Cryptanalysis of McEliece variants with compact keys ? toward a complexity analysis, Yet Another Conference on Cryptography, pp.1-4, 2010. ,
Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects, Advances in Cryptology -EUROCRYPT 2006, pp.30-47, 2006. ,
DOI : 10.1007/11761679_3
Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form, Advances in Cryptology Asiacrypt 2014, 2014. ,
DOI : 10.1007/978-3-662-45611-8_2
Structural weakness of compact variants of the Mceliece cryptosystem Available: https, IEEE International Symposium on Information Theory -ISIT 2014, pp.1717-1721, 2014. ,
Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields, Advances in Cryptology EU- ROCRYPT 2012, pp.27-44 ,
DOI : 10.1007/978-3-642-29011-4_4
Algebraic-differential cryptanalysis of DES, pp.1-5, 2009. ,
Decomposition of generic multivariate polynomials, Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation, ISSAC '10, pp.131-137, 2010. ,
DOI : 10.1145/1837934.1837963
Algebraic cryptanalysis of HFE using Gröbner bases " , INRIA, Reasearch report RR-4738, 2003. ,
FGb: a library for computing gröbner bases, Mathematical Software -ICMS 2010, pp.84-87, 2010. ,
Computing loci of rank defects of linear matrices using gröbner bases and applications to cryptology, Symbolic and Algebraic Computation, International Symposium Proceedings, W. Koepf, pp.257-264, 2010. ,
On the complexity of computing Gr??bner bases for weighted homogeneous systems, Journal of Symbolic Computation, vol.76, pp.107-141, 2016. ,
DOI : 10.1016/j.jsc.2015.12.001
Computing loci of rank defects of linear matrices using Gröbner bases and applications to cryptology, ISSAC 2010: Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation, pp.257-264, 2010. ,
Sub-cubic change of ordering for gröbner basis: A probabilistic approach, International Symposium on Symbolic and Algebraic Computation, pp.170-177, 2014. ,
Efficient Computation of Zero-dimensional Gr??bner Bases by Change of Ordering, Journal of Symbolic Computation, vol.16, issue.4, pp.329-344, 1993. ,
DOI : 10.1006/jsco.1993.1051
A polynomialtime key-recovery attack on MQQ cryptosystems, PKC 2015 ser. LNCS, pp.150-174, 2015. ,
Algebraic cryptanalysis of hidden field equation (HFE) cryptosystems using gröbner bases, CRYPTO 2003, D. Boneh, Ed., ser. LNCS, pp.44-60, 2003. ,
Cryptanalysis of MinRank, pp.280-296, 2008. ,
DOI : 10.1007/978-3-540-85174-5_16
Fast algorithm for change of ordering of zero-dimensional Gröbner bases with sparse multiplication matrices, ISSAC 2011: Proceedings of the 2011 International Symposium on Symbolic and Algebraic Computation, pp.115-122, 2011. ,
Folding Alternant and Goppa Codes With Non-Trivial Automorphism Groups, IEEE Transactions on Information Theory, vol.62, issue.1, pp.184-198, 2016. ,
DOI : 10.1109/TIT.2015.2493539
Cryptanalysis of 2R??? Schemes, Lecture Notes in Computer Science, vol.4117, pp.357-372, 2006. ,
DOI : 10.1007/11818175_21
Gr??bner bases of bihomogeneous ideals generated by polynomials of bidegree <mml:math altimg="si1.gif" display="inline" overflow="scroll" xmlns:xocs="http://www.elsevier.com/xml/xocs/dtd" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.elsevier.com/xml/ja/dtd" xmlns:ja="http://www.elsevier.com/xml/ja/dtd" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:tb="http://www.elsevier.com/xml/common/table/dtd" xmlns:sb="http://www.elsevier.com/xml/common/struct-bib/dtd" xmlns:ce="http://www.elsevier.com/xml/common/dtd" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:cals="http://www.elsevier.com/xml/common/cals/dtd"><mml:mrow><mml:mo>(</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo>)</mml:mo></mml:mrow></mml:math>: Algorithms and complexity, Journal of Symbolic Computation, vol.46, issue.4, pp.406-437, 2011. ,
DOI : 10.1016/j.jsc.2010.10.014
Sparse Gröbner bases: The unmixed case, International Symposium on Symbolic and Algebraic Computation, pp.178-185, 2014. ,
Computing small certificates of inconsistency of quadratic fewnomial systems, Proceedings of the ACM on International Symposium on Symbolic and Algebraic Computation, pp.223-230, 2016. ,
Gröbner bases of ideals invariant under a commutative group: The non-modular case, International Symposium on Symbolic and Algebraic Computation, pp.347-354, 2013. ,
Combinatorial cryptosystems galore! " , in Finite Fields: Theory , Applications, and Algorithms, ser. Contemporary ,
DOI : 10.1090/conm/168/01688
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies, J. Mathematical Cryptology, vol.8, issue.3, pp.209-247, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00652846
How To Prove Yourself: Practical Solutions to Identification and Signature Problems, CRYPTO'86, A. M. Odlyzko, Ed., ser. LNCS, pp.186-194, 1987. ,
DOI : 10.1007/3-540-47721-7_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.8796
Security Bounds for the Design of Code-Based Cryptosystems, ASIACRYPT 2009, M. Matsui, Ed., ser. LNCS, pp.88-105, 2009. ,
DOI : 10.1007/978-3-642-10366-7_6
An inequality for Hilbert series of graded algebras., MATHEMATICA SCANDINAVICA, vol.56, pp.117-144, 1985. ,
DOI : 10.7146/math.scand.a-12092
Hilbert Series for Ideals Generated by Generic Forms, Journal of Symbolic Computation, vol.17, issue.2, pp.149-157, 1994. ,
DOI : 10.1006/jsco.1994.1008
Shorter keys for code based cryptography, Proceedings of the 2005 International Workshop on Coding and Cryptography (WCC 2005), pp.81-91, 2005. ,
URL : https://hal.archives-ouvertes.fr/hal-00078726
Space-efficient variants of cryptosystems based on learning with errors, https ,
Powers of tensors and fast matrix multiplication, Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation, ISSAC '14, pp.296-303, 2014. ,
DOI : 10.1145/2608628.2608664
A new incremental algorithm for computing Groebner bases, Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation, ISSAC '10, pp.13-19, 2010. ,
DOI : 10.1145/1837934.1837944
A new framework for computing gröbner bases, Math. Comput, vol.85, issue.297, 2016. ,
Characteristic set algorithms for equation solving in finite fields, Journal of Symbolic Computation, vol.47, issue.6, pp.655-679, 2012. ,
DOI : 10.1016/j.jsc.2011.12.025
URL : http://dx.doi.org/10.1016/j.jsc.2011.12.025
Computers and Intractability: A Guide to the Theory of NP- Completeness, 1979. ,
Modern Computer Algebra (3. ed), 2013. ,
A fully homomorphic encryption scheme, 2009. ,
Homomorphic Evaluation of the AES Circuit, CRYPTO 2012, ser. LNCS, pp.850-867, 2012. ,
DOI : 10.1007/978-3-642-32009-5_49
A hard-core predicate for all one-way functions, Proceedings of the twenty-first annual ACM symposium on Theory of computing , STOC '89, pp.25-32, 1989. ,
DOI : 10.1145/73007.73010
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.95.2079
Cryptanalysis of the TTM Cryptosystem, ser. LNCS, pp.44-57, 2000. ,
DOI : 10.1007/3-540-44448-3_4
Probabilistic Multivariate Cryptography, Progress in Cryptology -VIETCRYPT 06, ser. LNCS, pp.1-18, 2006. ,
DOI : 10.1007/11958239_1
Inverting HFE Is Quasipolynomial, LNCS, vol.4117, pp.345-356, 2006. ,
DOI : 10.1007/11818175_20
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.79.844
A fast quantum mechanical algorithm for database search, Proceedings of the twenty-eighth annual ACM symposium on Theory of computing , STOC '96, pp.212-219, 1996. ,
DOI : 10.1145/237814.237866
URL : http://arxiv.org/abs/quant-ph/9605043
On the asymptotic complexity of solving LWE, Cryptology ePrint Archive, 1222. ,
Practical forward secure signatures using minimal security assumptions, 2013. ,
From 5-pass MQ-based identification to MQ-based signatures, IACR Cryptology ePrint Archive, vol.2016708, p.708, 2016. ,
Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies, Post-Quantum Cryptography -4th International Workshop, pp.19-34, 2011. ,
DOI : 10.1007/11533719_44
URL : https://hal.archives-ouvertes.fr/hal-00652846
A digital signature scheme based on random error-correcting codes, Crytography and Coding: 6th IMA International Conference Proceedings, M. Darnell, pp.161-167, 1997. ,
DOI : 10.1007/BFb0024461
An Efficient Post-Quantum One-Time Signature Scheme, Selected Areas in Cryptography -SAC 2015 -22nd International Conference, pp.331-351, 2015. ,
DOI : 10.3934/amc.2011.5.473
Breaking Symmetric Cryptosystems Using??Quantum??Period Finding, CRYPTO 2016, ser. LNCS, pp.207-237, 2016. ,
DOI : 10.1007/978-3-662-53008-5_8
URL : https://hal.archives-ouvertes.fr/hal-01404196
Unbalanced Oil and Vinegar Signature Schemes, EUROCRYPT'99, J. Stern, Ed., ser. LNCS, pp.206-222, 1999. ,
DOI : 10.1007/3-540-48910-X_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.970
Cryptanalysis of the oil and vinegar signature scheme, CRYPTO'98, H. Krawczyk, Ed., ser. LNCS, pp.257-266, 1998. ,
DOI : 10.1007/BFb0055733
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices, CRYPTO 2015, ser. LNCS, pp.43-62, 2015. ,
DOI : 10.1007/978-3-662-47989-6_3
Constructing digital signatures from a one-way function, 1979. ,
Gröbner-bases, Gaussian elimination and resolution of systems of algebraic equations, Proceedings of the European Computer Algebra Conference on Computer Algebra , ser, 1983. ,
An Observation on the Security of McEliece???s Public-Key Cryptosystem, EUROCRYPT'88, C. G. Günther, Ed., ser. LNCS, pp.275-280, 1988. ,
DOI : 10.1007/3-540-45961-8_25
A probabilistic algorithm for computing minimum weights of large error-correcting codes, IEEE Transactions on Information Theory, vol.34, issue.5, pp.1354-1359, 1988. ,
DOI : 10.1109/18.21270
Heuristic methods for computing the minimal multi-homogeneous B??zout number, Applied Mathematics and Computation, vol.146, issue.1, pp.237-256, 2003. ,
DOI : 10.1016/S0096-3003(02)00540-4
Hardness of k-LWE and applications in traitor tracing, CRYPTO 2014, ser. LNCS, pp.315-334, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01091300
Secure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$, Post-Quantum Cryptography, Second International Workshop Proceedings, pp.181-202, 2008. ,
DOI : 10.1007/978-3-540-27800-9_24
Weak keys in the McEliece public-key cryptosystem, IEEE Transactions on Information Theory, vol.47, issue.3, pp.1207-1211, 2001. ,
DOI : 10.1109/18.915687
Beating brute force for systems of polynomial equations over finite fields, to appear, 27th ACM-SIAM Symposium on Discrete Algorithms, 2017. ,
Asymptotically Efficient Lattice-Based Digital Signatures, Theory of Cryptography, Fifth Theory of Cryptography Conference, pp.37-54978, 2008. ,
DOI : 10.1007/978-3-540-78524-8_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.207.1767
SWIFFT: A Modest Proposal for FFT Hashing, pp.54-72, 2008. ,
DOI : 10.1007/978-3-540-71039-4_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.110.4697
On ideal lattices and learning with errors over rings, EUROCRYPT 2010, H. Gilbert, Ed., ser. LNCS, pp.1-23, 2010. ,
DOI : 10.1007/978-3-642-13190-5_1
URL : https://hal.archives-ouvertes.fr/hal-00921792
On some formula in elimination, pp.3-27, 1902. ,
The Algebraic Theory of Modular Systems, 1916. ,
The Theory of Error-Correcting Codes, Fifth, 1986. ,
Computing Minimal Multi-homogeneous B??zout Numbers Is Hard, STACS 2005, 22nd Annual Symposium on Theoretical Aspects of Computer Science, pp.244-255, 2005. ,
DOI : 10.1007/978-3-540-31856-9_20
Public quadratic polynominal-tuples for efficient signatureverification and message-encryption, pp.419-453, 1988. ,
DOI : 10.1007/3-540-45961-8_39
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.2397
On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes, EUROCRYPT 2015, ser. LNCS, pp.203-228, 2015. ,
DOI : 10.1007/978-3-662-46800-5_9
A public-key system based on algebraic coding theory, pp.114-116, 1978. ,
Hash-based signatures " , Internet Engineering Task Force, Internet-Draft draft-mcgrew-hash-sigs-05, Progress, 37 pp. [Online]. Available, 2016. ,
A Certified Digital Signature, ser. LNCS, pp.218-238, 1990. ,
DOI : 10.1007/0-387-34805-0_21
Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions, CRYPTO 2011, P. Rogaway, Ed., ser. LNCS, pp.465-484, 2011. ,
DOI : 10.1007/978-3-642-22792-9_26
Hardness of SIS and LWE with Small Parameters, CRYPTO 2013, ser. LNCS, pp.21-39, 2013. ,
DOI : 10.1007/978-3-642-40041-4_2
Lattice-based cryptography, pp.147-191978, 2009. ,
DOI : 10.1007/978-3-540-88702-7_5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.6557
Compact McEliece Keys from Goppa Codes, Selected Areas in Cryptography, 2009. ,
DOI : 10.1007/978-3-642-05445-7_24
URL : https://hal.archives-ouvertes.fr/hal-00870932
Chaff, Proceedings of the 38th conference on Design automation , DAC '01, pp.530-535, 2001. ,
DOI : 10.1145/378239.379017
Zero-knowledge for multivariate polynomials, Cryptology ePrint Archive, 2012. ,
DOI : 10.1007/978-3-642-33481-8_11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.5138
On the Hilbert series of ideals generated by generic forms, Communications in Algebra, vol.56, issue.8, 2015. ,
DOI : 10.1006/jabr.1997.7361
Semantic security for the McEliece cryptosystem without random oracles, Designs, Codes and Cryptography, vol.46, issue.4, pp.289-305, 2008. ,
DOI : 10.1007/s10623-008-9175-9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.137.8200
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model, CHES 2012, E. Prouff and P. Schaumont, Eds., ser. LNCS, pp.140-154, 2012. ,
DOI : 10.1007/978-3-642-33027-8_9
Code-based cryptography, pp.95-145, 2009. ,
DOI : 10.1007/978-3-540-88702-7_4
Cryptoanalysis of the Matsumoto and Imai public key scheme of euro- crypt'88, CRYPTO'95, D. Coppersmith, Ed., ser. LNCS, pp.248-261, 1995. ,
QUARTZ, 128-Bit Long Digital Signatures, CT-RSA 2001, D. Naccache, Ed., ser. LNCS, pp.282-297, 2001. ,
DOI : 10.1007/3-540-45353-9_21
128-bit long digital signatures The Cryptographer's Track at RSA Conference, Topics in Cryptology -CT-RSA 2001, pp.282-297, 2001. ,
Public-key cryptosystems from the worst-case shortest vector problem, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.333-342, 2009. ,
DOI : 10.1145/1536414.1536461
A Framework for Efficient and Composable Oblivious Transfer, ser. LNCS, pp.554-571, 2008. ,
DOI : 10.1007/978-3-540-85174-5_31
Algebraic and combinatorial tools for public key cryptography Available: https, 2005. ,
Compact McEliece keys based on quasi-dyadic Srivastava codes, Journal of Mathematical Cryptology, vol.6, issue.2, pp.149-169, 2012. ,
DOI : 10.1515/jmc-2011-0099
A multivariate based threshold ring signature scheme, Applicable Algebra in Engineering, Communication and Computing, vol.26, issue.5, pp.255-275, 2013. ,
DOI : 10.1007/s00200-013-0190-3
The use of information sets in decoding cyclic codes, IEEE Transactions on Information Theory, vol.8, issue.5, pp.5-9, 1962. ,
DOI : 10.1109/TIT.1962.1057777
Quantum-safe cryptography (QSC); quantum-safe algorithmic framework ,
New technique for solving sparse equation systems, IACR Cryptology ePrint Archive, p.475475, 2006. ,
On lattices, learning with errors, random linear codes, and cryptography, pp.84-93, 2005. ,
DOI : 10.1145/1060590.1060603
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.5202
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA, CHES 2009, ser. LNCS, pp.97-111, 2009. ,
DOI : 10.1007/978-3-642-04138-9_8
Public-Key Identification Schemes Based on Multivariate Cubic Polynomials, PKC 2012, ser. LNCS, pp.172-189, 2012. ,
DOI : 10.1007/978-3-642-30057-8_11
On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack, Post-Quantum Cryptography -4th International Workshop, pp.68-82978, 2011. ,
DOI : 10.1007/978-3-642-22792-9_40
Solving binary MQ with grover's algorithm, SPACES'16, 2016. ,
DOI : 10.1007/978-3-319-49445-6_17
Fast Probabilistic Algorithms for Verification of Polynomial Identities, Journal of the ACM, vol.27, issue.4, pp.701-717, 1980. ,
DOI : 10.1145/322217.322225
On solving sparse algebraic equations over finite fields, Des. Codes Cryptography, pp.47-60, 2008. ,
DOI : 10.1007/s10623-008-9182-x
Cryptosystèmes à clé publique basés sur les codes correcteurs d'erreurs " , Mémoire d'habilitation à diriger des recherches, 2002. ,
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer, SIAM Journal on Computing, vol.26, issue.5, pp.1484-1509, 1997. ,
DOI : 10.1137/S0097539795293172
Algebraic attack against trivium, First International Conference on Symbolic Computation and Cryptography, SCC 08, pp.95-102, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-01305667
Extending SAT Solvers to Cryptographic Problems, Theory and Applications of Satisfiability Testing -SAT 2009, 12th International Conference, pp.244-257, 2009. ,
DOI : 10.1007/s10817-007-9074-1
Solving multi-homogeneous and determinantal systems. algorithms -complexity -applications ,
URL : https://hal.archives-ouvertes.fr/tel-01110756
Efficient Public Key Encryption Based on Ideal Lattices, ASIACRYPT 2009, M. Matsui, Ed., ser. LNCS, pp.617-635, 2009. ,
DOI : 10.1007/978-3-642-10366-7_36
A method for finding codewords of small weight, Coding Theory and, pp.106-113, 1988. ,
DOI : 10.1007/BFb0019850
Algebraic Cryptanalysis of 58-Round SHA-1, ser. Lecture Notes in Computer Science, vol.4593, pp.349-365, 2007. ,
DOI : 10.1007/978-3-540-74619-5_22
URL : https://hal.archives-ouvertes.fr/hal-01336553
Solving zero-dimensional structured polynomial systems Available: https, 2014. ,
Multivariate subresultants using Jouanolou matrices, Journal of Pure and Applied Algebra, vol.214, issue.8, pp.1347-1369, 2010. ,
DOI : 10.1016/j.jpaa.2009.11.002
URL : http://doi.org/10.1016/j.jpaa.2009.11.002
On the existence of semi-regular sequences, Arxiv, 2014. ,
Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important, ser. LNCS, pp.188-202, 2012. ,
DOI : 10.1007/978-3-642-31410-0_12
Analysis of Information Set Decoding for a Sub-linear Error Weight, Post-Quantum Cryptography -7th International Workshop Proceedings, pp.144-161, 2016. ,
DOI : 10.1007/978-3-319-29360-8_10
URL : https://hal.archives-ouvertes.fr/hal-01244886
Post-Quantum Cryptography -4th International Workshop, Proceedings ser. Lecture Notes in Computer Science, vol.7071, pp.978-981, 2011. ,
A Novel Group Signature Scheme Based on MPKC, Information Security Practice and Experience -7th International Conference, pp.181-195978, 2011. ,
DOI : 10.1007/978-3-642-21031-0_14
TTS: High-Speed Signatures on a Low-Cost Smart Card, CHES 2004, ser. LNCS, pp.371-385, 2004. ,
DOI : 10.1007/978-3-540-28632-5_27
On Asymptotic Security Estimates in XL and Gr??bner Bases-Related Algebraic Cryptanalysis, ICICS 2004, pp.401-413, 2004. ,
DOI : 10.1007/978-3-540-30191-2_31