Multivariate Cryptography and Polynomial System Solving Complexity
Offered By: Society for Industrial and Applied Mathematics via YouTube
Course Description
Overview
Syllabus
Intro
A CRYPTOGRAPHY PRIMER Main goal: Achieving privacy and security in communications
ONE-WAY TRAPDOOR FUNCTIONS M set of messages, set of cyphertexts Definition
POST-QUANTUM CRYPTOGRAPHY
MULTIVARIATE CRYPTOGRAPHY
THE MULTIVARIATE QUADRATIC PROBLEM AND GRÖNER BASES
THE IMPORTANCE OF BEING LEX Shape Lemma
LINEAR-ALGEBRA-BASED GB ALGORITHMS Built from an idea of Lazard, they are currently the most efficient They include F/5s, XL and its variants
COMPUTING A LEX GROBNER BASIS IN PRACTICE compute a drl Grobner basis using a linear algebra-based algorithm convertit into a lex one using the FGLM Algorithm For cryptographic system, the complexity is dominated by the first step
BOUNDING THE SOLVING DEGREE
EXAMPLE - THE COMPLEXITY OF MINRANK MinRank Problem
RANDOM POLYNOMIAL SYSTEMS
HILBERT SERIES AND REGULAR SEQUENCES
REGULAR AND SEMIREGULAR SEQUENCES
SOLVING DEGREE OF SEMIREGULAR SEQUENCES
(RANDOM) REGULAR SEQUENCES OF QUADRICS
THE ABC CRYPTOSYSTEM
Taught by
Society for Industrial and Applied Mathematics
Related Courses
Post-Quantum ManifestoNorthSec via YouTube How to Explain Post-Quantum Cryptography to a Middle School Student
44CON Information Security Conference via YouTube Post-Quantum Cryptography - PKC 2023 Session
TheIACR via YouTube Post-Quantum Hardware Implementations
TheIACR via YouTube PQC IV High-End - Post-Quantum Cryptography Implementation
TheIACR via YouTube