{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T15:59:20Z","timestamp":1761580760196},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540239758"},{"type":"electronic","value":"9783540305392"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30539-2_23","type":"book-chapter","created":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T13:41:57Z","timestamp":1268401317000},"page":"323-337","source":"Crossref","is-referenced-by-count":49,"title":["The XL-Algorithm and a Conjecture from Commutative Algebra"],"prefix":"10.1007","author":[{"given":"Claus","family":"Diem","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","volume-title":"Introduction to Commutative Algebra","author":"M. Atiyah","year":"1969","unstructured":"Atiyah, M., Macdonald, I.: Introduction to Commutative Algebra. Addison-Wesley, Reading (1969)"},{"key":"23_CR2","unstructured":"Bardet, M., Faug\u00e8re, J.-C., Salvy, B.: Complexity of Gr\u00f6bner basis computations for Semi-regular Overdetermined sequences over \n                    \n                      \n                    \n                    $\\mathbb{F}_2$\n                   with solutions in \n                    \n                      \n                    \n                    $\\mathbb{F}_2$\n                  . INRIA Rapport de recherche No. 5049 (2003)"},{"key":"23_CR3","unstructured":"Chen, J.-M., Yang, B.-Y.: All in the XL Familiy: Theory and Practice (June 2004) (manuscript)"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-540-27800-9_24","volume-title":"Information Security and Privacy","author":"J.-M. Chen","year":"2004","unstructured":"Chen, J.-M., Yang, B.-Y.: Theoretical Analysis of XL over Small Fields. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol.\u00a03108, pp. 277\u2013288. Springer, Heidelberg (2004)"},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/3-540-36552-4_13","volume-title":"Information Security and Cryptology - ICISC 2002","author":"N. Courtois","year":"2003","unstructured":"Courtois, N.: Higher Order Correlation Attacks, XL algorithm, and Cryptanalysis of Toyocrypt. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol.\u00a02587, pp. 182\u2013199. Springer, Heidelberg (2003)"},{"key":"23_CR6","unstructured":"Courtois, N., Klimov, A., Pararin, J., Shamir, A.: Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations (extended version) (August 24, 2004), Available under, \n                    \n                      http:\/\/www.minrank.org\/xlfull.pdf"},{"key":"23_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/3-540-45539-6_27","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"N. Courtois","year":"2000","unstructured":"Courtois, N., Klimov, A., Pararin, J., Shamir, A.: Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 392\u2013407. Springer, Heidelberg (2000)"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/3-540-36178-2_17","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"N. Courtois","year":"2002","unstructured":"Courtois, N., Pieprzyk, J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 267\u2013287. Springer, Heidelberg (2002)"},{"key":"23_CR9","volume-title":"Commutative Algebra with a View Toward Algebraic Geometry","author":"D. Eisenbud","year":"1995","unstructured":"Eisenbud, D.: Commutative Algebra with a View Toward Algebraic Geometry. Springer, New York (1995)"},{"key":"23_CR10","doi-asserted-by":"crossref","first-page":"117","DOI":"10.7146\/math.scand.a-12092","volume":"56","author":"R. Fr\u00f6berg","year":"1985","unstructured":"Fr\u00f6berg, R.: An inequality for Hilbert series of graded algebras. Math. Scand.\u00a056, 117\u2013144 (1985)","journal-title":"Math. Scand."},{"key":"23_CR11","volume-title":"The Art of Computer Programming","author":"D. Knuth","year":"1973","unstructured":"Knuth, D.: The Art of Computer Programming. Addison-Wesley, Reading (1973)"},{"key":"23_CR12","volume-title":"Commutative Ring Theory","author":"H. Matsumura","year":"1986","unstructured":"Matsumura, H.: Commutative Ring Theory. Cambridge University Press, Cambridge (1986)"},{"key":"23_CR13","unstructured":"Moh, T.: On the method of \u201dXL\u201d and its inefficiency to TTM. (manuscript) (January 28, 2000), Available under, \n                    \n                      http:\/\/eprint.iacr.org\/2001\/047"},{"key":"23_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45708-9_1","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"S. Murphy","year":"2002","unstructured":"Murphy, S., Robshaw, M.J.B.: Essential algebraic structure within the AES. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 1\u201316. Springer, Heidelberg (2002)"},{"key":"23_CR15","unstructured":"Pardue, K.: Generic Sequences of Polynomials (manuscript ) (March 30, 2000)"},{"key":"23_CR16","series-title":"Progress in Mathematics","volume-title":"Six Lectures on Commutative Algebra","author":"G. Valla","year":"1996","unstructured":"Valla, G.: Problems and Results on Hilbert Polynomials of Graded Algebras. In: El\u00edas, J., Giral, J. (eds.) Six Lectures on Commutative Algebra. Progress in Mathematics, vol.\u00a0166. Birkh\u00e4user, Basel (1996)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - ASIACRYPT 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30539-2_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:59:07Z","timestamp":1605761947000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30539-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540239758","9783540305392"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30539-2_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}