Login / Signup

Attacking a polynomial-based cryptosystem: Polly Cracker.

Rainer SteinwandtWilli GeiselmannRegine Endsuleit
Published in: Int. J. Inf. Sec. (2002)
Keyphrases
  • cellular automata
  • public key cryptosystem
  • elliptic curve
  • information systems
  • database
  • multi agent
  • image encryption
  • power analysis
  • low degree
  • polynomial hierarchy
  • algebraic geometry