Cryptanalysis of a public-key cryptosystem based on Dickson-polynomials
Mathematica slovaca, Tome 38 (1988) no. 4, pp. 309-323
Cet article a éte moissonné depuis la source Czech Digital Mathematics Library

Voir la notice de l'article

Classification : 94A60
@article{MASLO_1988_38_4_a3,
     author = {N\"obauer, Rupert},
     title = {Cryptanalysis of a public-key cryptosystem based on {Dickson-polynomials}},
     journal = {Mathematica slovaca},
     pages = {309--323},
     year = {1988},
     volume = {38},
     number = {4},
     mrnumber = {978761},
     zbl = {0661.94011},
     language = {en},
     url = {http://geodesic.mathdoc.fr/item/MASLO_1988_38_4_a3/}
}
TY  - JOUR
AU  - Nöbauer, Rupert
TI  - Cryptanalysis of a public-key cryptosystem based on Dickson-polynomials
JO  - Mathematica slovaca
PY  - 1988
SP  - 309
EP  - 323
VL  - 38
IS  - 4
UR  - http://geodesic.mathdoc.fr/item/MASLO_1988_38_4_a3/
LA  - en
ID  - MASLO_1988_38_4_a3
ER  - 
%0 Journal Article
%A Nöbauer, Rupert
%T Cryptanalysis of a public-key cryptosystem based on Dickson-polynomials
%J Mathematica slovaca
%D 1988
%P 309-323
%V 38
%N 4
%U http://geodesic.mathdoc.fr/item/MASLO_1988_38_4_a3/
%G en
%F MASLO_1988_38_4_a3
Nöbauer, Rupert. Cryptanalysis of a public-key cryptosystem based on Dickson-polynomials. Mathematica slovaca, Tome 38 (1988) no. 4, pp. 309-323. http://geodesic.mathdoc.fr/item/MASLO_1988_38_4_a3/

[1] BERKOWITZ S.: Factoring via superencryption. Cгyptologia. 6, 1982, 229-237. | MR

[2] HERLESTAM T.: Critical remaгks on some public-key cryptosystems. BIT. 18, 1978, 493-496. | MR

[3] LIDL R., MÜLLER W. B.: Permutation polynomials in RSA-cгyptosystems. Proc. Crypto 83. Univ. Calif. St. Barbara, 1984, 293-301.

[4] MÜLLER W. B.: Über eine Klasse von durch Dikson-Polynome dargestellten Gruppen. Proc. of the Colloq. on rings, modules and radicals. Keszthely 1971, 1973, 361-376. | MR

[5] MÜLLER W. B., NÖBAUER R.: Cryptanalysis of the Dickson-scheme. Proc. Eurocrypt 85, Lecture Notes in Computer Science, Vol. 219, 1986, 50-61. | MR | Zbl

[6] MÜLLER W. B., NÖBAUER W.: Some remarks on public-key cryptosystems. Studia Sci. Math. Hungar. 16, 1981, 71-76. | MR | Zbl

[7] NÖBAUER R.: Über die Fixpunkte von durch Dicksonpolynome dargestellten Permutationen. Acta Arith. 45, 1985, 91-99. | MR | Zbl

[8] NÖBAUER R.: Cryptanalysis of the Rédei-scheme. Proc. Vienna Conf. 84. Contributions to General Algebra. 3, 1985, 255-164. | MR | Zbl

[9] NÖBAUER R.: Key distribution systems based on polynomial functions and on Rédei-functions. Problems of Control and Information Theory. 15, 1986, 91-100. | MR | Zbl

[10] NÖBAUER R.: Rédei-Funktionen und ihre Anwendung in der Kryptographie. To appear in Acta Sci. Math. Szeged. | MR | Zbl

[11] NÖBAUER W.: Über Permutationspolynome und Permutationsfunktionen für Primzahlpotenzen. Nonatsh. Math. 69, 1965, 230-238. | MR | Zbl

[12] NÖBAUER W.: Über eine Klasse von Permutationspolynomen und die dadurch dargestellten Gruppen. J. reine angew. Math. 231, 1968, 215-219. | MR | Zbl

[13] RÉDEI L.: Über eindeutig umkehrbare polynome in endlichen Körpern. Acta Sci. Math. Szeged. 11, 1946, 85-92. | MR | Zbl

[14] RIVEST R. L.: Remarks on a proposed cryptanalytic attack on the M.I.T. public-key cryptosystem. Cryptologia. 2, 1978, 62-65.

[15] RIVEST R. L., SHAMIR A., ADLEMAN L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM. 21, 1978, 120-126. | MR | Zbl

[16] SCHNORR C. P.: Is the RSA-scheme safe?. Lecture Notes m Computer Science. Vol. 149, 1983, 325-329. | Zbl

[17] SIMMONS G. J., NORRIS N. J.: Preliminary comments on the M.I.T. public-key cryptosystem. Cryptologia. 1, 1977, 406-414.