A Constructive Method of Algebraic Attack with Less Keystream Bits
暂无分享,去创建一个
Bin Wang | Haibin Kan | Qichun Wang | Xiaoyan Zhang | Bin Wang | Haibin Kan | Qichun Wang | Xiao-Yi Zhang
[1] J. Faugère. A new efficient algorithm for computing Gröbner bases (F4) , 1999 .
[2] Hideki Imai,et al. Relation between XL algorithm and Gröbner Bases Algorithms , 2004, IACR Cryptol. ePrint Arch..
[3] Claude Carlet,et al. Algebraic Attacks and Decomposition of Boolean Functions , 2004, EUROCRYPT.
[4] Nicolas Courtois. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[5] Jacques Patarin,et al. About the XL Algorithm over GF(2) , 2003, CT-RSA.
[6] Jean Charles Faugère,et al. A new efficient algorithm for computing Gröbner bases without reduction to zero (F5) , 2002, ISSAC '02.
[7] Frederik Armknecht,et al. Algebraic Attacks on Combiners with Memory , 2003, CRYPTO.
[8] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[9] Josef Pieprzyk,et al. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.
[10] Don Coppersmith,et al. Matrix multiplication via arithmetic progressions , 1987, STOC.
[11] Antoine Joux,et al. Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases , 2003, CRYPTO.
[12] Carlos Cid,et al. Nonlinear Equivalence of Stream Ciphers , 2010, FSE.
[13] Anne Canteaut,et al. Open Problems Related to Algebraic Attacks on Stream Ciphers , 2005, WCC.
[14] Tor Helleseth,et al. A New Attack on the Filter Generator , 2007, IEEE Transactions on Information Theory.
[15] Frederik Armknecht,et al. Improving Fast Algebraic Attacks , 2004, FSE.
[16] Adi Shamir,et al. Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations , 2000, EUROCRYPT.
[17] Nicolas Courtois,et al. The Security of Hidden Field Equations (HFE) , 2001, CT-RSA.
[18] Nicolas Courtois. Algebraic Attacks on Combiners with Memory and Several Outputs , 2003, ICISC.
[19] Adi Shamir,et al. Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization , 1999, CRYPTO.
[20] Nicolas Courtois,et al. Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt , 2002, ICISC.