18 research outputs found

    Factoring multivariate polynomials over finite fields

    Get PDF
    AbstractThis paper describes an algorithm for the factorization of multivariate polynomials with coefficients in a finite field that is polynomial-time in the degrees of the polynomial to be factored. The algorithm makes use of a new basis reduction algorithm for lattices over Fq[Y]

    Factoring multivariate polynomials over algebraic number fields

    Get PDF

    Factoring multivariate integral polynomials II: (preprint)

    Get PDF

    Factoring multivariate polynomials over algebraic number fields

    Get PDF

    Factoring polynomials over algebraic number fields

    Get PDF

    Factoring polynomials over algebraic number fields

    Get PDF

    Implementation of a new primality test

    Get PDF

    Chosen-Prefix Collisions for MD5 and Applications

    Get PDF
    We present a novel, automated way to find differential paths for MD5. Its main application is in the construction of \emph{chosen-prefix collisions}. We have shown how, at an approximate expected cost of 2392^{39} calls to the MD5 compression function, for any two chosen message prefixes PP and P′P', suffixes SS and S′S' can be constructed such that the concatenated values P∥SP\|S and P′∥S′P'\|S' collide under MD5. The practical attack potential of this construction of chosen-prefix collisions is of greater concern than the MD5-collisions that were published before. This is illustrated by a pair of MD5-based X.509 certificates one of which was signed by a commercial Certification Authority (CA) as a legitimate website certificate, while the other one is a certificate for a rogue CA that is entirely under our control (cf.\ \url{http://www.win.tue.nl/hashclash/rogue-ca/}). Other examples, such as MD5-colliding executables, are presented as well. More details can be found on \url{http://www.win.tue.nl/hashclash/ChosenPrefixCollisions/}
    corecore