Back to Results
First PageMeta Content
Mathematics / Hidden Field Equations / Polynomial / Error detection and correction / Cryptography / Multivariate cryptography / Factorization of polynomials over a finite field and irreducibility tests / Finite fields / Post-quantum cryptography / Coding theory


Document Date: 2007-10-22 04:50:53


Open Document

File Size: 416,06 KB

Share Result on Facebook

Company

BP / /

Country

France / /

Currency

pence / USD / /

/

IndustryTerm

non-deterministic algorithm / polynomial algorithm / few solutions / asymmetric algorithm / candidate algorithm / linearized polynomial algorithm / designed algorithms / present non-deterministic algorithm / root nding algorithms / erent algorithm / cient algorithms / classical algorithms / trace algorithm / exhaustive search / asymmetric algorithms / theses algorithms / /

Person

Hans Dobbertin / Jacques Patarin / Vanstone cf / Van Oorschot / /

Position

pm / p prime / Prime Minister / candidate for these two problems / /

Product

Pentax K-x Digital Camera / Cowon D2+ Portable Audio Device / F16 / /

ProgrammingLanguage

K / /

Technology

encryption / asymmetric algorithm / Berlekamp trace algorithm This algorithm / cryptography / RAM / 2 4 3 16 4 256 256 16 16 Trace algorithm / Berlekamp-Rabin algorithm This algorithm / Matsumoto-Imai algorithm / 2 Berlekamp Trace algorithm / linearized polynomial algorithm / public key / cient algorithms / erent algorithm / Berlekamp trace algorithm / HFE algorithms / theses algorithms / candidate algorithm / HFE algorithm / Berlekamp-Rabin algorithm / three classical algorithms / DSS algorithm / smart card / MD5 algorithm / modi ed Trace algorithm / carefully designed algorithms / secret key / 5.3 Improved algorithms / non-deterministic algorithm / Shoup algorithm / present non-deterministic algorithm / root nding algorithms / polynomial algorithm / /

SocialTag