Algebraic Attacks on Summation Generators
暂无分享,去创建一个
Dong Hoon Lee | Jin Hong | Jaeheon Kim | Dukjae Moon | Jae Woo Han | Dong Hoon Lee | Jaeheon Kim | Jin Hong | Jae-Woo Han | Dukjae Moon
[1] Rainer A. Rueppel,et al. Correlation Immunity and the Summation Generator , 1985, CRYPTO.
[2] Mark Goresky,et al. Cryptanalysis Based on 2-Adic Rational Approximation , 1995, CRYPTO.
[3] Adi Shamir,et al. Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization , 1999, CRYPTO.
[4] Nicolas Courtois,et al. The Security of Hidden Field Equations (HFE) , 2001, CT-RSA.
[5] Josef Pieprzyk,et al. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.
[6] Nicolas Courtois,et al. Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt , 2002, ICISC.
[7] Willi Meier,et al. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[8] Nicolas Courtois. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[9] Nicolas Courtois. Algebraic Attacks on Combiners with Memory and Several Outputs , 2003, ICISC.
[10] Frederik Armknecht,et al. Algebraic Attacks on Combiners with Memory , 2003, CRYPTO.
[11] Frederik Armknecht,et al. Improving Fast Algebraic Attacks , 2004, FSE.
[12] Willi Meier,et al. Correlation properties of combiners with memory in stream ciphers , 1991, Journal of Cryptology.