Breaking rainbow takes a weekend on a laptop

W Beullens - Annual International Cryptology Conference, 2022 - Springer
This work introduces new key recovery attacks against the Rainbow signature scheme,
which is one of the three finalist signature schemes still in the NIST Post-Quantum …

An analytical model for predicting the remaining battery capacity of lithium-ion batteries

P Rong, M Pedram - IEEE transactions on very large scale …, 2006 - ieeexplore.ieee.org
Predicting the residual energy of the battery source that powers a portable electronic device
is imperative in designing and applying an effective dynamic power management policy for …

An estimator for the hardness of the MQ problem

E Bellini, RH Makarim, C Sanna, J Verbel - International Conference on …, 2022 - Springer
Abstract The Multivariate Quadratic (MQ) problem consists in finding the solutions of a given
system of m quadratic equations in n unknowns over a finite field, and it is an NP-complete …

Improving Support-Minors Rank Attacks: Applications to GMSS and Rainbow

J Baena, P Briaud, D Cabarcas, R Perlner… - Annual International …, 2022 - Springer
Abstract The Support-Minors (SM) method has opened new routes to attack multivariate
schemes with rank properties that were previously impossible to exploit, as shown by the …

A new algebraic approach to the regular syndrome decoding problem and implications for PCG constructions

P Briaud, M Øygarden - Annual International Conference on the Theory …, 2023 - Springer
Abstract The Regular Syndrome Decoding (RSD) problem, a variant of the Syndrome
Decoding problem with a particular error distribution, was introduced almost 20 years ago by …

A new approach based on quadratic forms to attack the McEliece cryptosystem

A Couvreur, R Mora, JP Tillich - … Conference on the Theory and Application …, 2023 - Springer
We introduce a novel algebraic approach for attacking the McEliece cryptosystem which is
currently at the 4-th round of the NIST competition. The contributions of the article are …

A crossbred algorithm for solving Boolean polynomial systems

A Joux, V Vitse - … Conference on Number-Theoretic Methods in …, 2017 - Springer
We consider the problem of solving multivariate systems of Boolean polynomial equations:
starting from a system of m polynomials of degree at most d in n variables, we want to find its …

A new security analysis against mayo and qr-uov using rectangular minrank attack

H Furue, Y Ikematsu - International Workshop on Security, 2023 - Springer
Multivariate public-key cryptography (MPKC) is considered as one of the main candidates
for post-quantum cryptography (PQC). In MPKC, the MinRank attacks, which try to solve the …

MQ challenge: hardness evaluation of solving multivariate quadratic problems

T Yasuda, X Dahan, YJ Huang, T Takagi… - Cryptology ePrint …, 2015 - eprint.iacr.org
Multivariate Quadratic polynomial (MQ) problem serve as the basis of security for potentially
post-quantum cryptosystems. The hardness of solving MQ problem depends on a number of …

Worst-case subexponential attacks on PRGs of constant degree or constant locality

A Ünal - Annual International Conference on the Theory and …, 2023 - Springer
In this work, we will give new attacks on the pseudorandomness of algebraic pseudorandom
number generators (PRGs) of polynomial stretch. Our algorithms apply to a broad class of …