Skip to main content

Showing 1–5 of 5 results for author: Toli, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:1006.5894  [pdf, ps, other

    cs.IT cs.CR

    A possible intrinsic weakness of AES and other cryptosystems

    Authors: Anna Rimoldi, Massimiliano Sala, Ilia Toli

    Abstract: It has been suggested that the algebraic structure of AES (and other similar block ciphers) could lead to a weakness exploitable in new attacks. In this paper, we use the algebraic structure of AES-like ciphers to construct a cipher embedding where the ciphers may lose their non-linearity. We show some examples and we discuss the limitations of our approach.

    Submitted 11 November, 2010; v1 submitted 30 June, 2010; originally announced June 2010.

    Comments: 46 pages- updated bibliography and fixed minor problems

  2. arXiv:0909.2694  [pdf, ps, other

    cs.CC cs.DM

    Singularity of Sparse Circulant Matrices is NP-complete

    Authors: Ilia Toli

    Abstract: It is shown by Karp reduction that deciding the singularity of $(2^n - 1) \times (2^n - 1)$ sparse circulant matrices (SC problem) is NP-complete. We can write them only implicitly, by indicating values of the $2 + n(n + 1)/2$ eventually nonzero entries of the first row and can make all matrix operations with them. The positions are $0, 1, 2^{i} + 2^{j}$. The complexity parameter is $n$. Mulmule… ▽ More

    Submitted 14 September, 2009; originally announced September 2009.

    Comments: References are somewhere in the middle, before the appendices. 8 pages

  3. arXiv:cs/0305034  [pdf, ps, other

    cs.CR cs.SC

    Cryptanalysis of HFE

    Authors: Ilia Toli

    Abstract: I transform the trapdoor problem of HFE into a linear algebra problem.

    Submitted 26 June, 2003; v1 submitted 17 May, 2003; originally announced May 2003.

    Comments: 7 pages. Minor changes expected

    ACM Class: E.3

  4. arXiv:cs/0304013  [pdf, ps, other

    cs.CR cs.SC

    Hidden Polynomial(s) Cryptosystems

    Authors: Ilia Toli

    Abstract: We propose public-key cryptosystems with public key a system of polynomial equations, algebraic or differential, and private key a single polynomial or a small-size ideal. We set up probabilistic encryption, signature, and signcryption protocols.

    Submitted 9 April, 2003; originally announced April 2003.

    ACM Class: E.3

  5. arXiv:cs/0302037  [pdf, ps, other

    cs.CR cs.SC

    Hidden Polynomial(s) Cryptosystems

    Authors: Ilia Toli

    Abstract: We propose variations of the class of hidden monomial cryptosystems in order to make it resistant to all known attacks. We use identities built upon a single bivariate polynomial equation with coefficients in a finite field. Indeed, it can be replaced by a ``small'' ideal, as well. Throughout, we set up probabilistic encryption protocols, too. The same ideas extend to digital signature algorithm… ▽ More

    Submitted 29 March, 2003; v1 submitted 26 February, 2003; originally announced February 2003.

    Comments: 17 pages

    ACM Class: E.3