Abstract | ||
---|---|---|
In this paper, we investigate the security of a hash function based on the evaluation of multivariate polynomials [17]. The security of such hash function is related to the difficulty of solving (under-defined) systems of algebraic equations. To solve these systems, we have used a general hybrid approach [8] mixing exhaustive search and Gröbner bases solving. This shows that this approach is general and can be used in several contexts. For the sparse construction, we have refined this strategy. From a practical point of view, we have been able to break several challenges proposed by Ding and Yang [17] in real time. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1007/978-3-642-01440-6_11 | international conference on information security and cryptology |
Keywords | Field | DocType |
hash function,security analysis,algebraic equation,exhaustive search,multivariate polynomials,sparse construction,bner base,practical point,multivariate polynomial,real time,general hybrid approach | Brute-force search,Double hashing,Computer science,Theoretical computer science,Algebraic equation,Security analysis,Perfect hash function,K-independent hashing,Hash function,Dynamic perfect hashing | Conference |
Volume | ISSN | Citations |
5487 | 0302-9743 | 2 |
PageRank | References | Authors |
0.40 | 12 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Luk Bettale | 1 | 111 | 7.18 |
Jean-Charles Faugère | 2 | 1037 | 74.00 |
Ludovic Perret | 3 | 546 | 39.06 |