Sciweavers

223 search results - page 17 / 45
» Multivariates Polynomials for Hashing
Sort
View
142
Voted
FSE
2007
Springer
115views Cryptology» more  FSE 2007»
15 years 8 months ago
Improving the Security of MACs Via Randomized Message Preprocessing
Abstract. “Hash then encrypt” is an approach to message authentication, where first the message is hashed down using an ε-universal hash function, and then the resulting k-bi...
Yevgeniy Dodis, Krzysztof Pietrzak
112
Voted
ISSAC
2005
Springer
110views Mathematics» more  ISSAC 2005»
15 years 8 months ago
Multivariate power series multiplication
We study the multiplication of multivariate power series. We show that over large enough fields, the bilinear complexity of the product modulo a monomial ideal M is bounded by th...
Éric Schost
152
Voted
CORR
2010
Springer
139views Education» more  CORR 2010»
14 years 9 months ago
A recombination algorithm for the decomposition of multivariate rational functions
In this paper we show how we can compute in a deterministic way the decomposition of a multivariate rational function with a recombination strategy. The key point of our recombinat...
Guillaume Chèze
131
Voted
CASC
2009
Springer
103views Mathematics» more  CASC 2009»
15 years 9 months ago
Lazy and Forgetful Polynomial Arithmetic and Applications
We present lazy and forgetful algorithms for adding, multiplying and dividing multivariate polynomials. The lazy property allows us to compute the i-th term of a polynomial withou...
Michael B. Monagan, Paul Vrbik
120
Voted
EUROCRYPT
2006
Springer
15 years 6 months ago
Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects
The Isomorphism of Polynomials (IP) [28], which is the main concern of this paper, originally corresponds to the problem of recovering the secret key of a C scheme [26]. Besides, t...
Jean-Charles Faugère, Ludovic Perret