Results 1 to 10 of about 4,148,124 (195)

Poseidon and Neptune: Gröbner Basis Cryptanalysis Exploiting Subspace Trails

open access: diamondIACR Transactions on Symmetric Cryptology
At the current state of the art, algebraic attacks are the most efficient method for finding preimages and collisions for arithmetization-oriented hash functions, such as the closely related primitives Poseidon/Poseidon2 and Neptune.
Lorenzo Grassi   +2 more
doaj   +4 more sources

Global identifiability of latent class models with applications to diagnostic test accuracy studies: A Gröbner basis approach. [PDF]

open access: yesBiometrics, 2020
Identifiability of statistical models is a fundamental regularity condition that is required for valid statistical inference. Investigation of model identifiability is mathematically challenging for complex models such as latent class models. Jones et al.
Duan R   +11 more
europepmc   +2 more sources

A generic and executable formalization of signature-based Gröbner basis algorithms [PDF]

open access: greenJournal of symbolic computation, 2020
We present a generic and executable formalization of signature-based algorithms (such as Faugere's F 5 ) for computing Grobner bases, as well as their mathematical background, in the Isabelle/HOL proof assistant.
Alexander Maletzky
openalex   +3 more sources

A message recovery attack on multivariate polynomial trapdoor function [PDF]

open access: yesPeerJ Computer Science, 2023
Cybersecurity guarantees the exchange of information through a public channel in a secure way. That is the data must be protected from unauthorized parties and transmitted to the intended parties with confidentiality and integrity. In this work, we mount
Rashid Ali   +4 more
doaj   +3 more sources

Gröbner Basis Cryptanalysis of Ciminion and Hydra [PDF]

open access: greenIACR Transactions on Symmetric Cryptology
Ciminion and Hydra are two recently introduced symmetric key Pseudo- Random Functions for Multi-Party Computation applications. For efficiency, both primitives utilize quadratic permutations at round level.
Matthias Johann Steiner
doaj   +2 more sources

Determining implicit equation of conic section from quadratic rational Bézier curve using Gröbner basis

open access: diamondJournal of Physics: Conference Series, 2021
The Gröbner Basis is a subset of finite generating polynomials in the ideal of the polynomial ring k[x 1,…,xn ]. The Gröbner basis has a wide range of applications in various areas of mathematics, including determining implicit polynomial equations.
Y R Anwar, Hengki Tasman, N Hariadi
openalex   +2 more sources

Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi

open access: yesIACR Transactions on Symmetric Cryptology
Gröbner basis cryptanalysis of hash functions and ciphers, and their underlying permutations, has seen renewed interest recently. Anemoi (Crypto’23) is a permutation-based hash function that is efficient for a variety of arithmetizations used in zero ...
Katharina Koschatko   +2 more
doaj   +2 more sources

Gröbner basis and the automaton property of Hecke--Kiselman algebras [PDF]

open access: greenSemigroup Forum, 2018
It is shown that the Hecke–Kiselman algebra associated to a finite directed graph is an automaton algebra in the sense of Ufnarovskii. Consequently, its Gelfand–Kirillov dimension is an integer if it is finite.
Arkadiusz Mȩcel, Jan Okniński
openalex   +3 more sources

Algebraic Cryptanalysis Scheme of AES-256 Using Gröbner Basis

open access: yesJournal of Electrical and Computer Engineering, 2017
The zero-dimensional Gröbner basis construction is a crucial step in Gröbner basis cryptanalysis on AES-256. In this paper, after performing an in-depth study on the linear transformation and the system of multivariate polynomial equations of AES-256 ...
Kaixin Zhao, Jie Cui, Zhiqiang Xie
doaj   +2 more sources

A Gröbner basis for the graph of the reciprocal plane [PDF]

open access: bronzeJournal of Commutative Algebra, 2020
Given the complement of a hyperplane arrangement, let $\Gamma$ be the closure of the graph of the map inverting each of its defining linear forms. The characteristic polynomial manifests itself in the Hilbert series of $\Gamma$ in two different-seeming ...
Alex Fink, David E Speyer, Alexander Woo
openalex   +3 more sources

Home - About - Disclaimer - Privacy