{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:16Z","timestamp":1750307536186,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,7,28]],"date-time":"2009-07-28T00:00:00Z","timestamp":1248739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,7,28]]},"DOI":"10.1145\/1576702.1576755","type":"proceedings-article","created":{"date-parts":[[2009,7,28]],"date-time":"2009-07-28T12:45:28Z","timestamp":1248785128000},"page":"383-384","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Interactions between computer algebra (Gr\u00f6bner bases) and cryptology"],"prefix":"10.1145","author":[{"given":"Jean-Charles","family":"Faug\u00e8re","sequence":"first","affiliation":[{"name":"INRIA, Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2009,7,28]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"369","volume-title":"First International Conference (ICICS'97)","volume":"1334","author":"Goubin L.","year":"1997","unstructured":"L. Goubin , and J. Patarin . Asymmetric Cryptography with S-Boxes. Information and Communication Security , First International Conference (ICICS'97) , Lecture Notes in Computer Science vol. 1334 , Springer-Verlag, pp. 369 -- 380 , 1997 . L. Goubin, and J. Patarin. Asymmetric Cryptography with S-Boxes. Information and Communication Security, First International Conference (ICICS'97), Lecture Notes in Computer Science vol. 1334, Springer-Verlag, pp. 369--380, 1997."},{"key":"e_1_3_2_1_2_1","first-page":"315","volume-title":"CRYPTO 1999","volume":"1666","author":"Ye D. F.","year":"1999","unstructured":"D. F. Ye , K. Y. Lam , Z. D. Dai . Cryptanalysis of \"2R\" Schemes, Adv in Cryptology - CRYPTO 1999 , Lecture Notes in Computer Science , vol. 1666 , Springer-Verlag, pp. 315 -- 325 , 1999 . D. F. Ye, K. Y. Lam, Z. D. Dai. Cryptanalysis of \"2R\" Schemes, Adv in Cryptology - CRYPTO 1999, Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, pp. 315--325, 1999."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0001-z"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the First International Conference on Symbolic Computation and Cryptography, SCC 2008","author":"Albrecht M.","year":"2008","unstructured":"M. Albrecht , and C. Cid . Algebraic Techniques in Differential Cryptanalysis . Proceedings of the First International Conference on Symbolic Computation and Cryptography, SCC 2008 , Beijing, China , April 2008 . M. Albrecht, and C. Cid. Algebraic Techniques in Differential Cryptanalysis. Proceedings of the First International Conference on Symbolic Computation and Cryptography, SCC 2008, Beijing, China, April 2008."},{"key":"e_1_3_2_1_5_1","volume-title":"Applications des bases de Gr&amp;#246;bner &amp;#224","author":"Ars G.","year":"2004","unstructured":"G. Ars . Applications des bases de Gr&amp;#246;bner &amp;#224 ; la cryptographie. Th&amp;#232;se de doctorat, Universit&amp;#233; de Rennes I , 2004 . G. Ars. Applications des bases de Gr&amp;#246;bner &amp;#224; la cryptographie. Th&amp;#232;se de doctorat, Universit&amp;#233; de Rennes I, 2004."},{"key":"e_1_3_2_1_6_1","volume-title":"Yang. Asymptotic Behaviour of the Degree of Regularity of Semi-Regular Polynomial Systems. In Proc. of MEGA 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry","author":"Bardet M.","year":"2005","unstructured":"M. Bardet , J-C. Faug &amp;#232;re, B. Salvy and B.- Y. Yang. Asymptotic Behaviour of the Degree of Regularity of Semi-Regular Polynomial Systems. In Proc. of MEGA 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry , 2005 . M. Bardet, J-C. Faug&amp;#232;re, B. Salvy and B.-Y. Yang. Asymptotic Behaviour of the Degree of Regularity of Semi-Regular Polynomial Systems. In Proc. of MEGA 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry, 2005."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72540-4_21"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"L.\n      Bettale\n     and \n      J. C.\n      Faug\n    &amp;#232;re and \n      L.\n      Perret\n  . \n  Cryptanalysis of the TRMS Cryptosystem of PKC 05 AfricaCrypt\n  2008 Lecture Notes in Computer Science vol. \n  5023 Springer-Verlag pp. \n  143\n  --\n  155 2008.   L. Bettale and J. C. Faug&amp;#232;re and L. Perret. Cryptanalysis of the TRMS Cryptosystem of PKC 05 AfricaCrypt 2008 Lecture Notes in Computer Science vol. 5023 Springer-Verlag pp. 143--155 2008.","DOI":"10.1007\/978-3-540-68164-9_10"},{"key":"e_1_3_2_1_9_1","volume-title":"Security Analysis of Multivariate Polynomials for Hashing. Information Security and Cryptology - Inscrypt","author":"Bettale L.","year":"2008","unstructured":"L. Bettale and J. C. Faug &amp;#232;re and L. Perret . Security Analysis of Multivariate Polynomials for Hashing. Information Security and Cryptology - Inscrypt 2008 , Springer-Verlag , 2008. L. Bettale and J. C. Faug&amp;#232;re and L. Perret. Security Analysis of Multivariate Polynomials for Hashing. Information Security and Cryptology - Inscrypt 2008, Springer-Verlag, 2008."},{"key":"e_1_3_2_1_10_1","volume-title":"SAC","author":"Bouillaguet C.","year":"2008","unstructured":"C. Bouillaguet , and P.-A. Fouque . Analysis of the Collision Resistance of Radio Gat&amp;#252;n using Algebraic Techniques . SAC 2008 , LNCS, Springer-Verlag. To appear. C. Bouillaguet, and P.-A. Fouque. Analysis of the Collision Resistance of Radio Gat&amp;#252;n using Algebraic Techniques. SAC 2008, LNCS, Springer-Verlag. To appear."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_20"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"N.\n      Courtois and \n      J.\n      Pieprzyk\n  . \n  Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. Advances in Cryptology - ASIACRYPT\n  2002 Lecture Notes in Computer Science vol. \n  2501 pp. \n  267\n  --\n  287 2002.   N. Courtois and J. Pieprzyk. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. Advances in Cryptology - ASIACRYPT 2002 Lecture Notes in Computer Science vol. 2501 pp. 267--287 2002.","DOI":"10.1007\/3-540-36178-2_17"},{"key":"e_1_3_2_1_14_1","first-page":"176","volume-title":"LNCS","volume":"2729","author":"Courtois N.","year":"2003","unstructured":"N. Courtois . Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. Advances in Cryptology - CRYPTO 2003 , LNCS , vol. 2729 , pp. 176 -- 194 , 2003 . N. Courtois. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. Advances in Cryptology - CRYPTO 2003, LNCS, vol. 2729, pp. 176--194, 2003."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"N.\n      Courtois and \n      W.\n      Meier\n  . \n  Algebraic Attacks on Stream Ciphers with Linear Feedback. Advances in Cryptology - EUROCRYPT\n  2003 Lecture Notes in Computer Science vol. \n  2656 pp. \n  345\n  --\n  359 2003.   N. Courtois and W. Meier. Algebraic Attacks on Stream Ciphers with Linear Feedback. Advances in Cryptology - EUROCRYPT 2003 Lecture Notes in Computer Science vol. 2656 pp. 345--359 2003.","DOI":"10.1007\/3-540-39200-9_21"},{"key":"e_1_3_2_1_16_1","volume-title":"The Design of Rijndael: The Wide Trail Strategy","author":"Daemen J.","year":"2001","unstructured":"J. Daemen , V. Rijmen . The Design of Rijndael: The Wide Trail Strategy . Springer-Verlag ( 2001 ). J. Daemen, V. Rijmen. The Design of Rijndael: The Wide Trail Strategy. Springer-Verlag (2001)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-4049(99)00005-5"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/780506.780516"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"J.-C.\n      Faug\n    &amp;#232;re and \n      A.\n      Joux\n  . \n  Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems using Gr&amp;#246;bner bases. Advances in Cryptology - CRYPTO\n  2003 Lecture Notes in Computer Science vol. \n  2729 Springer-Verlag pp. \n  44\n  --\n  60 2003.  J.-C. Faug&amp;#232;re and A. Joux. Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems using Gr&amp;#246;bner bases. Advances in Cryptology - CRYPTO 2003 Lecture Notes in Computer Science vol. 2729 Springer-Verlag pp. 44--60 2003.","DOI":"10.1007\/978-3-540-45146-4_3"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_3"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"J.-C.\n      Faug\n    &amp;#232;re and \n      L.\n      Perret\n  . \n  Cryptanalysis of 2R- Schemes. Advances in Cryptology - CRYPTO\n  2006 Lecture Notes in Computer Science vol. \n  4117 pp. \n  357\n  --\n  372 2006.  J.-C. Faug&amp;#232;re and L. Perret. Cryptanalysis of 2R- Schemes. Advances in Cryptology - CRYPTO 2006 Lecture Notes in Computer Science vol. 4117 pp. 357--372 2006.","DOI":"10.1007\/11818175_21"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_16"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the First International Conference on Symbolic Computation and Cryptography, SCC 2008","author":"Faug J. C.","year":"2008","unstructured":"J. C. Faug &amp;#232;re and L. Perret . On the Security of UOV pp. 103--109 , Proceedings of the First International Conference on Symbolic Computation and Cryptography, SCC 2008 , Beijing, China , April 2008 . J. C. Faug&amp;#232;re and L. Perret. On the Security of UOV pp. 103--109, Proceedings of the First International Conference on Symbolic Computation and Cryptography, SCC 2008, Beijing, China, April 2008."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsc.2008.02.005"},{"key":"e_1_3_2_1_25_1","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"PKC","author":"Fouque P.-A.","year":"2008","unstructured":"P.-A. Fouque , G. Macariorat , L. Perret and J. Stern . On the Security of the l-IC Signature Scheme. Public Key Cryptography, 14th International Workshop on Practice and Theory in Public Key Cryptography , PKC 2008 , Lecture Notes in Computer Science , vol. 4939 , pp. 1 -- 17 , Springer-Verlag , 2008. P.-A. Fouque, G. Macariorat, L. Perret and J. Stern. On the Security of the l-IC Signature Scheme. Public Key Cryptography, 14th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2008, Lecture Notes in Computer Science, vol. 4939, pp. 1--17, Springer-Verlag, 2008."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01457454"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_28_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1007\/978-3-540-74619-5_22","volume-title":"FSE","author":"Sugita M.","year":"2007","unstructured":"M. Sugita , M. Kawazoe , L. Perret , and H. Imai . Algebraic Cryptanalysis of 58-Round SHA-1. Fast Software Encryption, 14th International Workshop , FSE 2007 , Lecture Notes in Computer Science , vol. 4593 , Springer-Verlag , pp. 349 - 365 , 2007. M. Sugita, M. Kawazoe, L. Perret, and H. Imai. Algebraic Cryptanalysis of 58-Round SHA-1. Fast Software Encryption, 14th International Workshop, FSE 2007, Lecture Notes in Computer Science, vol. 4593, Springer-Verlag, pp. 349-365, 2007."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390768.1390811"}],"event":{"name":"ISSAC '09: International Symposium on Symbolic and Algebraic Computation","sponsor":["ACM Association for Computing Machinery","SIGSAM ACM Special Interest Group on Symbolic and Algebraic Manipulation"],"location":"Seoul Republic of Korea","acronym":"ISSAC '09"},"container-title":["Proceedings of the 2009 international symposium on Symbolic and algebraic computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1576702.1576755","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1576702.1576755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:17Z","timestamp":1750249397000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1576702.1576755"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,28]]},"references-count":29,"alternative-id":["10.1145\/1576702.1576755","10.1145\/1576702"],"URL":"https:\/\/doi.org\/10.1145\/1576702.1576755","relation":{},"subject":[],"published":{"date-parts":[[2009,7,28]]},"assertion":[{"value":"2009-07-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}