On Existence and Invariant of Algebraic Attacks
暂无分享,去创建一个
[1] Josef Pieprzyk,et al. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.
[2] Guang Gong,et al. Transform domain analysis of DES , 1999, IEEE Trans. Inf. Theory.
[3] Anne Canteaut,et al. On cryptographic properties of the cosets of R(1, m) , 2001, IEEE Trans. Inf. Theory.
[4] Claude Carlet,et al. Algebraic Attacks and Decomposition of Boolean Functions , 2004, EUROCRYPT.
[5] Palash Sarkar,et al. Nonlinearity Bounds and Constructions of Resilient Boolean Functions , 2000, CRYPTO.
[6] Thomas Siegenthaler,et al. Correlation-immunity of nonlinear combining functions for cryptographic applications , 1984, IEEE Trans. Inf. Theory.
[7] Claude Carlet,et al. More Correlation-Immune and Resilient Functions over Galois Fields and Galois Rings , 1997, EUROCRYPT.
[8] Kaoru Kurosawa,et al. Design of SAC/PC(l) of Order k Boolean Functions and Three Other Cryptographic Criteria , 1997, EUROCRYPT.
[9] Nicolas Courtois. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[10] Frederik Armknecht,et al. Algebraic Attacks on Combiners with Memory , 2003, CRYPTO.
[11] Hans Dobbertin,et al. Construction of Bent Functions and Balanced Boolean Functions with High Nonlinearity , 1994, FSE.
[12] Yuliang Zheng,et al. Relationships between Bent Functions and Complementary Plateaued Functions , 1999, ICISC.
[13] N. Courtois,et al. Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations , 2000, EUROCRYPT.
[14] J. Dillon. Elementary Hadamard Difference Sets , 1974 .
[15] Nicolas Courtois,et al. Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt , 2002, ICISC.
[16] Amr M. Youssef,et al. Hyper-bent Functions , 2001, EUROCRYPT.
[17] Willi Meier,et al. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[18] Stafford E. Tavares,et al. An Expanded Set of S-box Design Criteria Based on Information Theory and its Relation to Differential-Like Attacks , 1991, EUROCRYPT.
[19] Claude Carlet,et al. A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction , 2002, CRYPTO.
[20] Claude Carlet,et al. On Correlation-Immune Functions , 1991, CRYPTO.
[21] Solomon W. Golomb,et al. On the classification of Boolean functions , 1959, IRE Trans. Inf. Theory.
[22] Yuliang Zheng,et al. Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions , 2000, Selected Areas in Cryptography.
[23] James L. Massey,et al. A spectral characterization of correlation-immune combining functions , 1988, IEEE Trans. Inf. Theory.