Solving Degree Bounds For Iterated Polynomial Systems
The study focuses on Gröbner basis attacks on cryptographic polynomial systems, particularly iterated polynomial systems, which are standard models for symmetric ciphers and hash functions. The author extends an established…
Continue reading