MXL2: Solving polynomial equations over GF(2) Using an improved mutant strategy

Mohamed Saied Emam Mohamed, Wael Said Abd Elmageed Mohamed, Jintai Ding, Johannes Buchmann

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

37 Citations (Scopus)

Abstract

MutantXL is an algorithm for solving systems of polynomial equations that was proposed at SCC 2008. This paper proposes two substantial improvements to this algorithm over GF(2) that result in significantly reduced memory usage. We present experimental results comparing MXL2 to the XL algorithm, the MutantXL algorithm and Magma's implementation of F 4. For this comparison we have chosen small, randomly generated instances of the MQ problem and quadratic systems derived from HFE instances. In both cases, the largest matrices produced by MXL2 are substantially smaller than the ones produced by MutantXL and XL. Moreover, for a significant number of cases we even see a reduction of the size of the largest matrix when we compare MXL2 against Magma's F 4 implementation.

Original languageEnglish
Title of host publicationPost-Quantum Cryptography - Second International Workshop, PQCrypto 2008, Proceedings
PublisherSpringer Verlag
Pages203-215
Number of pages13
ISBN (Print)3540884025, 9783540884026
DOIs
Publication statusPublished - 2008
Externally publishedYes
Event2nd International Workshop on Post-Quantum Cryptography, PQCrypto 2008 - Cincinnati, OH, United States
Duration: 17 Oct 200819 Oct 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5299 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Workshop on Post-Quantum Cryptography, PQCrypto 2008
Country/TerritoryUnited States
CityCincinnati, OH
Period17/10/0819/10/08

Fingerprint

Dive into the research topics of 'MXL2: Solving polynomial equations over GF(2) Using an improved mutant strategy'. Together they form a unique fingerprint.

Cite this