Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering
暂无分享,去创建一个
[1] Frederik Armknecht. A Linearization Attack on the Bluetooth Key Stream Generator , 2002, IACR Cryptol. ePrint Arch..
[2] Nicolas Courtois. Algebraic Attacks on Combiners with Memory and Several Outputs , 2003, ICISC.
[3] Frederik Armknecht,et al. Algebraic Attacks on Combiners with Memory , 2003, CRYPTO.
[4] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[5] Jean Louis Dornstetter. On the equivalence between Berlekamp's and Euclid's algorithms , 1987, IEEE Trans. Inf. Theory.
[6] Nicolas Courtois,et al. Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt , 2002, ICISC.
[7] V. Strassen. Gaussian elimination is not optimal , 1969 .
[8] Nicolas Courtois. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[9] Thomas Johansson,et al. Distinguishing Attacks on SOBER-t16 and t32 , 2002, FSE.
[10] Willi Meier,et al. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.