Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers
暂无分享,去创建一个
[1] Fabio Massacci. Towards the Formal Verification of Ciphers: Logical Cryptanalysis of DES , 1999 .
[2] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[3] Laurent Simon,et al. Preface to the Special Volume on the SAT 2005 Competitions and Evaluations , 2006, J. Satisf. Boolean Model. Comput..
[4] Ilya Mironov,et al. Applications of SAT Solvers to Cryptanalysis of Hash Functions , 2006, SAT.
[5] Timothy A. Davis,et al. Direct methods for sparse linear systems , 2006, Fundamentals of algorithms.
[6] Fabio Massacci,et al. Logical Cryptanalysis as a SAT Problem ? Encoding and Analysis of the U.S. Data Encryption Standard , 2000 .
[7] Jean Charles Faugère,et al. A new efficient algorithm for computing Gröbner bases without reduction to zero (F5) , 2002, ISSAC '02.
[8] Ilkka Niemelä,et al. DES: a Challenge Problem for Nonmonotonic Reasoning Systems , 2000, ArXiv.
[9] J. Faugère. A new efficient algorithm for computing Gröbner bases (F4) , 1999 .
[10] Fabio Massacci,et al. Using Walk-SAT and Rel-Sat for Cryptographic Key Search , 1999, IJCAI.
[11] Thomas Jakobson,et al. Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree , 1998, CRYPTO.
[12] Josef Pieprzyk,et al. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.
[13] Adi Shamir,et al. Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations , 2000, EUROCRYPT.
[14] Jacques Patarin,et al. QUAD: A Practical Stream Cipher with Provable Security , 2006, EUROCRYPT.
[15] Sharad Malik,et al. Chaff: engineering an efficient SAT solver , 2001, Proceedings of the 38th Design Automation Conference (IEEE Cat. No.01CH37232).
[16] Fabio Massacci,et al. How to fake an RSA signature by encoding modular root finding as a SAT problem , 2003, Discret. Appl. Math..
[17] Nadia Creignou,et al. Satisfiability Threshold for Random XOR-CNF Formulas , 1999, Discret. Appl. Math..
[18] Gregory V. Bard. Achieving a log(n) Speed Up for Boolean Matrix Operations and Calculating the Complexity of the Dense Linear Algebra step of Algebraic Stream Cipher Attacks and of Integer Factorization Methods , 2006, IACR Cryptol. ePrint Arch..
[19] Gregory V. Bard,et al. Algebraic Cryptanalysis of the Data Encryption Standard , 2007, IMACC.
[20] Matthew J. B. Robshaw,et al. Essential Algebraic Structure within the AES , 2002, CRYPTO.
[21] Predrag Janicic,et al. Logical Analysis of Hash Functions , 2005, FroCoS.