Buchberger's algorithm and staggered linear bases
SYMSAC '86 Proceedings of the fifth ACM symposium on Symbolic and algebraic computation
Gröbner bases computation using syzygies
ISSAC '92 Papers from the international symposium on Symbolic and algebraic computation
Gro¨bner bases: a computational approach to commutative algebra
Gro¨bner bases: a computational approach to commutative algebra
Involutive bases of polynomial ideals
Mathematics and Computers in Simulation - Special issue: Simplification of systems of algebraic and differential equations with applications
A criterion for detecting unnecessary reductions in the construction of Groebner bases
EUROSAM '79 Proceedings of the International Symposiumon on Symbolic and Algebraic Computation
Gröbner-Bases, Gaussian elimination and resolution of systems of algebraic equations
EUROCAL '83 Proceedings of the European Computer Algebra Conference on Computer Algebra
Changing the ordering of Gröbner bases with LLL: case of two variables
ISSAC '03 Proceedings of the 2003 international symposium on Symbolic and algebraic computation
Using computer algebra to find nash equilibria
ISSAC '03 Proceedings of the 2003 international symposium on Symbolic and algebraic computation
Design and Properties of a New Pseudorandom Generator Based on a Filtered FCSR Automaton
IEEE Transactions on Computers
Complexity of the resolution of parametric systems of polynomial equations and inequations
Proceedings of the 2006 international symposium on Symbolic and algebraic computation
Border bases of positive dimensional polynomial ideals
Proceedings of the 2007 international workshop on Symbolic-numeric computation
Gröbner bases: a sampler of recent developments
Proceedings of the 2007 international symposium on Symbolic and algebraic computation
Computing Gröbner bases of ideals of few points in high dimensions
ACM Communications in Computer Algebra
Groebner bases computation in Boolean rings for symbolic model checking
MOAS'07 Proceedings of the 18th conference on Proceedings of the 18th IASTED International Conference: modelling and simulation
Proceedings of the twenty-first international symposium on Symbolic and algebraic computation
A pommaret division algorithm for computing Grobner bases in boolean rings
Proceedings of the twenty-first international symposium on Symbolic and algebraic computation
An algorithm for finding symmetric Grobner bases in infinite dimensional rings
Proceedings of the twenty-first international symposium on Symbolic and algebraic computation
Computing the multiplicity structure from geometric involutive form
Proceedings of the twenty-first international symposium on Symbolic and algebraic computation
Involutive method for computing Gröbner bases over $$ \mathbb{F}_2 $$
Programming and Computing Software
Solving Multiple Right Hand Sides linear equations
Designs, Codes and Cryptography
On solving sparse algebraic equations over finite fields
Designs, Codes and Cryptography
Fast Computations of Gröbner Bases and Blind Recognitions of Convolutional Codes
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
Kipnis-Shamir Attack on HFE Revisited
Information Security and Cryptology
Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator
Fast Software Encryption
On Cryptographically Significant Mappings over GF(2n)
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Algebraic Attack on HFE Revisited
ISC '08 Proceedings of the 11th international conference on Information Security
Algebraic Attacks on the Courtois Toy Cipher
Cryptologia
Square-Vinegar Signature Scheme
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and lIC-Derivatives
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
Secure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
ACM Communications in Computer Algebra
Thirty years of Polynomial System Solving, and now?
Journal of Symbolic Computation
Solving polynomial systems via symbolic-numeric reduction to geometric involutive form
Journal of Symbolic Computation
Role of involutive criteria in computing Boolean Gröbner bases
Programming and Computing Software
Square, a New Multivariate Encryption Scheme
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Security Analysis of Multivariate Polynomials for Hashing
Information Security and Cryptology
On the topology of planar algebraic curves
Proceedings of the twenty-fifth annual symposium on Computational geometry
Extending SAT Solvers to Cryptographic Problems
SAT '09 Proceedings of the 12th International Conference on Theory and Applications of Satisfiability Testing
Solving systems of polynomial equations with symmetries using SAGBI-Gröbner bases
Proceedings of the 2009 international symposium on Symbolic and algebraic computation
High order derivatives and decomposition of multivariate polynomials
Proceedings of the 2009 international symposium on Symbolic and algebraic computation
Interactions between computer algebra (Gröbner bases) and cryptology
Proceedings of the 2009 international symposium on Symbolic and algebraic computation
On the decoding of binary cyclic codes with the Newton identities
Journal of Symbolic Computation
An efficient algorithm for decomposing multivariate polynomials and its applications to cryptography
Journal of Symbolic Computation
Journal of Symbolic Computation
On locally minimal Nullstellensatz proofs
Proceedings of the 7th International Workshop on Satisfiability Modulo Theories
Groebner bases computation in Boolean rings for symbolic model checking
MS '07 The 18th IASTED International Conference on Modelling and Simulation
Solving Structured Polynomial Systems and Applications to Cryptology
CASC '09 Proceedings of the 11th International Workshop on Computer Algebra in Scientific Computing
A Study on Gröbner Basis with Inexact Input
CASC '09 Proceedings of the 11th International Workshop on Computer Algebra in Scientific Computing
Computing Gröbner Bases within Linear Algebra
CASC '09 Proceedings of the 11th International Workshop on Computer Algebra in Scientific Computing
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Extensions of the Cube Attack Based on Low Degree Annihilators
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Geometric Ideas for Cryptographic Equation Solving in Even Characteristic
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure
Information Security Applications
Fast computation of Gröbner bases of ideals of F[x, y]
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Fast and robust numerical solutions to minimal problems for cameras with radial distortion
Computer Vision and Image Understanding
Constructing linear transformations of MPKC by generalized central symmetric matrices
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
Probabilistic versus deterministic algebraic cryptanalysis: a performance comparison
IEEE Transactions on Information Theory
A Groebner bases-based approach to backward reasoning in rule based expert systems
Annals of Mathematics and Artificial Intelligence
When stream cipher analysis meets public-key cryptography
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
l-invertible cycles for multivariate quadratic (MQ) public key cryptography
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Generalization of the F5 algorithm for calculating Gröbner bases for polynomial ideals
Programming and Computing Software
Analysis of multivariate hash functions
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
Cryptanalysis of the TRMS signature scheme of PKC'05
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
New differential-algebraic attacks and reparametrization of rainbow
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Total break of the l-IC signature scheme
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Parallel Gaussian elimination for Gröbner bases computations in finite fields
Proceedings of the 4th International Workshop on Parallel and Symbolic Computation
A new incremental algorithm for computing Groebner bases
Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation
Decomposition of generic multivariate polynomials
Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation
Computing loci of rank defects of linear matrices using Gröbner bases and applications to cryptology
Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation
Journal of Symbolic Computation
Gröbner bases for polynomial systems with parameters
Journal of Symbolic Computation
F5C: A variant of Faugère's F5 algorithm with reduced Gröbner bases
Journal of Symbolic Computation
Fast exhaustive search for polynomial systems in F2
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
Algebraic and numerical algorithms
Algorithms and theory of computation handbook
MXL3: an efficient algorithm for computing gröbner bases of zero-dimensional ideals
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Cryptanalysis of the hidden matrix cryptosystem
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
FGb: a library for computing Gröbner bases
ICMS'10 Proceedings of the Third international congress conference on Mathematical software
Journal of Symbolic Computation
Algebraic cryptanalysis of curry and flurry using correlated messages
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Computing inhomogeneous Gröbner bases
Journal of Symbolic Computation
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Cryptanalysis of multivariate and odd-characteristic HFE variants
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Sparse Boolean equations and circuit lattices
Designs, Codes and Cryptography
Linear algebra to compute syzygies and Gröbner bases
Proceedings of the 36th international symposium on Symbolic and algebraic computation
Signature-based algorithms to compute Gröbner bases
Proceedings of the 36th international symposium on Symbolic and algebraic computation
Proceedings of the 36th international symposium on Symbolic and algebraic computation
Space-efficient Gröbner basis computation without degree bounds
Proceedings of the 36th international symposium on Symbolic and algebraic computation
Computing a structured Gröbner basis approximately
Proceedings of the 36th international symposium on Symbolic and algebraic computation
A generalized criterion for signature related Gröbner basis algorithms
Proceedings of the 36th international symposium on Symbolic and algebraic computation
Journal of Symbolic Computation
Applying IsRewritten criterion on Buchberger algorithm
Theoretical Computer Science
Modifying Faugère's F5 algorithm to ensure termination
ACM Communications in Computer Algebra
Public-key identification schemes based on multivariate quadratic polynomials
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
Small public keys and fast verification for multivariate quadratic public key systems
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
An improvement of linearization-based algebraic attacks
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
Algebraic analysis of GOST encryption algorithm
Proceedings of the 4th international conference on Security of information and networks
A different algebraic analysis of the ZUC stream cipher
Proceedings of the 4th international conference on Security of information and networks
Algebraic analysis of the SSS stream cipher
Proceedings of the 4th international conference on Security of information and networks
Differential dynamic logics: automated theorem proving for hybrid systems
Differential dynamic logics: automated theorem proving for hybrid systems
Probabilistic multivariate cryptography
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Open problems related to algebraic attacks on stream ciphers
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
F-FCSR: design of a new class of stream ciphers
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Building secure tame-like multivariate public-key cryptosystems: the new TTS
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
A "medium-field" multivariate public-key encryption scheme
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
A zero-dimensional gröbner basis for AES-128
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Hybrid method for solving new pose estimation equation system
IWMM'04/GIAE'04 Proceedings of the 6th international conference on Computer Algebra and Geometric Algebra with Applications
Tractable rational map signature
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Cryptanalysis of the tractable rational map cryptosystem
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Resistance of SNOW 2.0 against algebraic attacks
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
A study of the security of unbalanced oil and vinegar signature schemes
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Some algebraic aspects of the advanced encryption standard
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
On the discrete logarithm problem on algebraic tori
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
CASC'05 Proceedings of the 8th international conference on Computer Algebra in Scientific Computing
Algebraic attacks on combiners with memory and several outputs
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
All in the XL family: theory and practice
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Algebraic cryptanalysis of the PKC’2009 algebraic surface cryptosystem
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
Algebraic cryptanalysis of mceliece variants with compact keys
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Inverting HFE is quasipolynomial
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Growth of the ideal generated by a quadratic boolean function
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
Key exchange and encryption schemes based on non-commutative skew polynomials
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
Selecting parameters for the rainbow signature scheme
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
Characteristic set algorithms for equation solving in finite fields
Journal of Symbolic Computation
Polynomial equivalence problems: algorithmic and theoretical aspects
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Complexity estimates for the F4 attack on the perturbed Matsumoto-Imai cryptosystem
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Probabilistic algebraic attacks
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
On the (im)possibility of practical and secure nonlinear filters and combiners
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Variant quantifier elimination
Journal of Symbolic Computation
Implementing minimized multivariate PKC on low-resource embedded systems
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Breaking an identity-based encryption scheme based on DHIES
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
Improving the complexity of index calculus algorithms in elliptic curves over binary fields
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Solving underdetermined systems of multivariate quadratic equations revisited
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Public-Key identification schemes based on multivariate cubic polynomials
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Public-Key cryptography from new multivariate quadratic assumptions
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Complexity of Gröbner basis detection and border basis detection
Theoretical Computer Science
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Deducing the constraints in the light-cone SU(3) Yang-Mills mechanics via Gröbner bases
CASC'07 Proceedings of the 10th international conference on Computer Algebra in Scientific Computing
Resolution of a system of fuzzy polynomial equations using the Gröbner basis
Information Sciences: an International Journal
Applying cube attacks to stream ciphers in realistic scenarios
Cryptography and Communications
On the complexity of solving quadratic Boolean systems
Journal of Complexity
A new public key signature scheme based on multivariate polynomials
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Solving quadratic equations with XL on parallel architectures
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Parallel reduction of matrices in gröbner bases computations
CASC'12 Proceedings of the 14th international conference on Computer Algebra in Scientific Computing
Root-refining for a polynomial equation
CASC'12 Proceedings of the 14th international conference on Computer Algebra in Scientific Computing
A logic-algebraic approach to decision taking in a railway interlocking system
Annals of Mathematics and Artificial Intelligence
Fast change of ordering with exponent ω
ACM Communications in Computer Algebra
Multivariate public key cryptosystems from diophantine equations
Designs, Codes and Cryptography
On polynomial systems arising from a weil descent
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Solving polynomial systems over finite fields: improved analysis of the hybrid approach
Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation
Critical points and Gröbner bases: the unmixed case
Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation
Practical Gröbner basis computation
Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation
A signature-based algorithm for computing Gröbner bases in solvable polynomial algebras
Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation
Selecting lengths of floats for the computation of approximate Gröbner bases
Journal of Symbolic Computation
On the use of Buchberger criteria in G2V algorithm for calculating Gröbner bases
Programming and Computing Software
The termination of the F5 algorithm revisited
Proceedings of the 38th international symposium on International symposium on symbolic and algebraic computation
Signature rewriting in gröbner basis computation
Proceedings of the 38th international symposium on International symposium on symbolic and algebraic computation
On the complexity of computing gröbner bases for quasi-homogeneous systems
Proceedings of the 38th international symposium on International symposium on symbolic and algebraic computation
Gröbner bases of ideals invariant under a commutative group: the non-modular case
Proceedings of the 38th international symposium on International symposium on symbolic and algebraic computation
Improving incremental signature-based Gröbner basis algorithms
ACM Communications in Computer Algebra
Involutive bases algorithm incorporating F5 criterion
Journal of Symbolic Computation
An analysis of inhomogeneous signature-based Gröbner basis computations
Journal of Symbolic Computation
A Gröbner basis approach for finding positive solution of fully fuzzy polynomial equations systems
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology
Termination of the F5 algorithm
Programming and Computing Software
Hi-index | 0.07 |
This paper introduces a new efficient algorithm for computing Gröbner bases. We replace the Buchberger criteria by an optimal criteria. We give a proof that the resulting algorithm (called F5) generates no useless critical pairs if the input is a regular sequence. This a new result by itself but a first implementation of the algorithm F5 shows that it is also very efficient in practice: for instance previously untractable problems can be solved (cyclic 10). In practice for most examples there is no reduction to zero. We illustrate this algorithm by one detailed example.