18 research outputs found

    Factoring multivariate polynomials over algebraic number fields

    Get PDF

    Factoring multivariate polynomials over finite fields

    Get PDF
    AbstractThis paper describes an algorithm for the factorization of multivariate polynomials with coefficients in a finite field that is polynomial-time in the degrees of the polynomial to be factored. The algorithm makes use of a new basis reduction algorithm for lattices over Fq[Y]

    Factoring multivariate integral polynomials II: (preprint)

    Get PDF

    Factoring multivariate polynomials over algebraic number fields

    Get PDF

    Factoring polynomials over algebraic number fields

    Get PDF

    Factoring polynomials over algebraic number fields

    Get PDF

    Implementation of a new primality test

    Get PDF

    Chosen-Prefix Collisions for MD5 and Applications

    Get PDF
    We present a novel, automated way to find differential paths for MD5. Its main application is in the construction of \emph{chosen-prefix collisions}. We have shown how, at an approximate expected cost of 2392^{39} calls to the MD5 compression function, for any two chosen message prefixes PP and P′P', suffixes SS and S′S' can be constructed such that the concatenated values P∥SP\|S and P′∥S′P'\|S' collide under MD5. The practical attack potential of this construction of chosen-prefix collisions is of greater concern than the MD5-collisions that were published before. This is illustrated by a pair of MD5-based X.509 certificates one of which was signed by a commercial Certification Authority (CA) as a legitimate website certificate, while the other one is a certificate for a rogue CA that is entirely under our control (cf.\ \url{http://www.win.tue.nl/hashclash/rogue-ca/}). Other examples, such as MD5-colliding executables, are presented as well. More details can be found on \url{http://www.win.tue.nl/hashclash/ChosenPrefixCollisions/}
    corecore