Using Wiedemann's Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks
暂无分享,去创建一个
[1] Subhamoy Maitra,et al. Reducing the Number of Homogeneous Linear Equations in Finding Annihilators , 2006, SETA.
[2] Jean-Charles Faugère,et al. An Algebraic Cryptanalysis of Nonlinear Filter Generators using Gröbner bases , 2003 .
[3] Frederik Armknecht,et al. Improving Fast Algebraic Attacks , 2004, FSE.
[4] Antoine Joux,et al. Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases , 2003, CRYPTO.
[5] Claude Carlet. Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions , 2004, IACR Cryptol. ePrint Arch..
[6] Claude Carlet,et al. Algebraic Attacks and Decomposition of Boolean Functions , 2004, EUROCRYPT.
[7] Philip Hawkes,et al. Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers , 2004, CRYPTO.
[8] Bart Preneel,et al. On the Algebraic Immunity of Symmetric Boolean Functions , 2005, INDOCRYPT.
[9] Douglas H. Wiedemann. Solving sparse linear equations over finite fields , 1986, IEEE Trans. Inf. Theory.
[10] Subhamoy Maitra,et al. Results on Algebraic Immunity for Cryptographically Significant Boolean Functions , 2004, INDOCRYPT.
[11] Frederik Armknecht,et al. Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks , 2006, EUROCRYPT.
[12] James L. Massey,et al. Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.
[13] Willi Meier,et al. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[14] Jean-Pierre Tillich,et al. Computing the Algebraic Immunity Efficiently , 2006, FSE.
[15] D. Coppersmith. Solving homogeneous linear equations over GF (2) via block Wiedemann algorithm , 1994 .
[16] Bart Preneel,et al. Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks , 2006, ACISP.
[17] Andrew M. Odlyzko,et al. Discrete Logarithms in Finite Fields and Their Cryptographic Significance , 1985, EUROCRYPT.
[18] Nicolas Courtois. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[19] Don Coppersmith,et al. Discrete logarithms inGF(p) , 2005, Algorithmica.
[20] Subhamoy Maitra,et al. Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity , 2006, Des. Codes Cryptogr..