Paper 2024/196
Subfield attack: leveraging composite-degree extensions in the Quotient Ring transform
Abstract
In this note, we show that some of the parameters of the Quotient-Ring transform proposed for VOX are vulnerable.
More precisely, they were chosen to defeat an attack in the field extension
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- Multivariate cryptography
- Contact author(s)
- pierre pebereau @ lip6 fr
- History
- 2024-02-12: approved
- 2024-02-09: received
- See all versions
- Short URL
- https://ia.cr/2024/196
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/196, author = {Pierre Pébereau}, title = {Subfield attack: leveraging composite-degree extensions in the Quotient Ring transform}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/196}, year = {2024}, url = {https://eprint.iacr.org/2024/196} }