Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem

12Citations
Citations of this article
41Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We describe a cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem, published at Eurocrypt 2003 by Augot and Finiasz. Given the public-key and a ciphertext, we recover the corresponding plaintext in polynomial time. Our technique is a variant of the Berlekamp-Welsh algorithm. We also describe a cryptanalysis of the reparation published by the authors on the IACR eprint archive, using a variant of the previous attack. Both attacks are practical as given the public-key and a ciphertext, one recovers the plaintext in a few minutes on a single PC. © International Association for Cryptologic Research 2004.

Cite

CITATION STYLE

APA

Coron, J. S. (2004). Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2947, 14–27. https://doi.org/10.1007/978-3-540-24632-9_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free