We adapt tag-variables and Buchberger reduction in order, given two elements, pg∈ R into an effective ring R, to express g as the evaluation of a polynomial f(X) ∈ R[X] at p, g= f(p). As a by-product, we present also an attack to a couple of Cryptographical protocols.

Why you cannot even hope to use Ore algebras in Cryptography / Ceria, Michela; Mora, Teo; Visconti, Andrea. - In: APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING. - ISSN 0938-1279. - STAMPA. - 32:3(2021), pp. 229-244. [10.1007/s00200-021-00493-9]

Why you cannot even hope to use Ore algebras in Cryptography

Michela Ceria;
2021-01-01

Abstract

We adapt tag-variables and Buchberger reduction in order, given two elements, pg∈ R into an effective ring R, to express g as the evaluation of a polynomial f(X) ∈ R[X] at p, g= f(p). As a by-product, we present also an attack to a couple of Cryptographical protocols.
2021
Why you cannot even hope to use Ore algebras in Cryptography / Ceria, Michela; Mora, Teo; Visconti, Andrea. - In: APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING. - ISSN 0938-1279. - STAMPA. - 32:3(2021), pp. 229-244. [10.1007/s00200-021-00493-9]
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11589/232540
Citazioni
  • Scopus 1
  • ???jsp.display-item.citation.isi??? 1
social impact