Cube Attacks on Tweakable Black Box Polynomials
暂无分享,去创建一个
[1] Jovan Dj. Golic. On the Security of Nonlinear Filter Generators , 1996, FSE.
[2] Iyad A. Ajwa,et al. Grobner Bases Algorithm , 1995 .
[3] Shahram Khazaei,et al. Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers , 2008, AFRICACRYPT.
[4] Ed Dawson,et al. Generalized Inversion Attack on Nonlinear Filter Generators , 2000, IEEE Trans. Computers.
[5] Sanjeev Arora,et al. Probabilistic checking of proofs: a new characterization of NP , 1998, JACM.
[6] Alex Biryukov,et al. Two Trivial Attacks on Trivium , 2007, IACR Cryptol. ePrint Arch..
[7] Antoine Joux,et al. A Chosen IV Attack Against Turing , 2003, Selected Areas in Cryptography.
[8] Meltem Sönmez Turan,et al. Linear Approximations for 2-round Trivium , 2007 .
[9] Vincent Rijmen,et al. The Block Cipher Square , 1997, FSE.
[10] Willi Meier,et al. Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium , 2009, FSE.
[11] Markku-Juhani O. Saarinen. Linearization Attacks Against Syndrome Based Hashes , 2007, INDOCRYPT.
[12] Sean O'Neil. Algebraic Structure Defectoscopy , 2007, IACR Cryptol. ePrint Arch..
[13] Manuel Blum,et al. Self-testing/correcting with applications to numerical problems , 1990, STOC '90.
[14] Thomas Johansson,et al. A New Simple Technique to Attack Filter Generators and Related Ciphers , 2004, Selected Areas in Cryptography.
[15] Nicolas Courtois. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[16] Thomas Johansson,et al. Fast Correlation Attacks through Reconstruction of Linear Polynomials , 2000, CRYPTO.
[17] Hideki Imai,et al. Comparison Between XL and Gröbner Basis Algorithms , 2004, ASIACRYPT.
[18] Michael Vielhaber. Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack , 2007, IACR Cryptol. ePrint Arch..
[19] Bo-Yin Yang,et al. On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis , 2004, ICICS.
[20] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[21] Thomas Johansson,et al. A Framework for Chosen IV Statistical Analysis of Stream Ciphers , 2007, INDOCRYPT.
[22] Lars R. Knudsen,et al. The Interpolation Attack on Block Ciphers , 1997, FSE.
[23] J. Faugère. A new efficient algorithm for computing Gröbner bases (F4) , 1999 .
[24] Willi Meier,et al. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[25] Jacques Patarin,et al. About the XL Algorithm over GF(2) , 2003, CT-RSA.
[26] Christophe De Cannière,et al. Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles , 2006, ISC.
[27] Josef Pieprzyk,et al. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.
[28] Adi Shamir,et al. Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations , 2000, EUROCRYPT.
[29] Markku-Juhani O. Saarinen. Chosen-IV Statistical Attacks on eStream Ciphers , 2006, SECRYPT.