|
Contributed Talks |
-
Keqin Feng, Qunying Liao and Feng Liu: On (2^m+1)-variable Symmetric Boolean Functions with Submaximum Algebraic Immunity 2^(m-1)
-
Jintai Ding and John Wagner: Cryptanalysis of Rational Multivariate Public Key Cryptosystems
-
Michael Brickenstein and Stanislav Bulygin: Attacking AES via Solving Systems in the Key Variables Only
-
Shigeo Tsujii, Kohtaro Tadaki and Ryou Fujita: Nonlinear Piece in Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems
-
Yasufumi Hashimoto and Kouichi Sakurai: A Construction of Non-Commutative Birational Permutation Signature Scheme
-
Clemens Heuberger: Redundant tau-adic Expansions II: Non-Optimality and Chaotic Behaviour
-
Martin Albrecht and Carlos Cid: Algebraic Techniques in Differential Cryptanalysis
-
Ayoub Otmani, Jean-Pierre Tillich and L¨Ļonard Dallot: Cryptanalysis of a McEliece Cryptosystem Based on Quasi-Cyclic LDPC Codes
-
Ivan Soprunov and Evgenia Soprunova: Toric Surface Codes and Minkowski Length of Polygons
-
Tobias Eibach and Gunnar Völkel: Optimising Gröbner Bases on Bivium
-
Jintai Ding, Daniel Carbarcas, Dieter Schmidt, Johannes Buchmann, Mohamed Saied Emam Mohamed,
Wael Said Abd Elmageed Mohamed, Stefan Tohaneanu and Ralf-Philipp Weinmann:
MutantXL and Mutant Gröbner Basis Algorithm
-
Burçin Eröcal: SCrypt: Using Symbolic Computation to Bridge the Gap Between Algebra and Cryptography
-
Moon Sung Lee and Sang Geun Hahn: Analysis of the GGH Cryptosystem
-
Moritz Minzlaff: Computing Zeta Functions of Superelliptic Curves in Larger Characteristic
-
Olivier Billet, Jacques Patarin and Yannick Seurin: Analysis of Intermediate Field Systems
-
Claude Carlet, Xiangyong Zeng, Chunlei Li and Lei Hu: Further Properties of Several Classes of Boolean Functions with Optimum Algebraic Immunity
-
Ralf-Philipp Weinmann and Johannes Buchmann: Distributed Memory Computation of Row-Reduced Echelon Forms over Finite Fields
-
Robert Gilman, Alex D. Miasnikov, Alexei G. Myasnikov and Alexander Ushakov: New Developments in Commutator Key Exchange
-
Jean-Charles Faug¨¨re and Ludovic Perret: On the Security of UOV
-
Alex D. Myasnikov and Alexander Ushakov: Cryptanalysis of the Anshel-Anshel-Goldfeld-Lemieux Key Agreement Protocol
-
Ilaria Simonetti, Ludovic Perret and Jean-Charles Faug¨¨re: Algebraic Attack Against Trivium
|
|
Copyright © 2007 LMIB |
|