Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function
From MaRDI portal
Publication:500004
DOI10.1007/S12190-014-0845-7zbMath1369.94566OpenAlexW2018135428WikidataQ123183276 ScholiaQ123183276MaRDI QIDQ500004
Dibyendu Roy, Sourav Mukhopadhyay, Pratish Datta
Publication date: 7 October 2015
Published in: Journal of Applied Mathematics and Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12190-014-0845-7
Boolean functionalgebraic attackfast algebraic attackdecomposition of Boolean functionfaultGrain-v1probabilistic algebraic attack
Uses Software
Cites Work
- Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function
- A new efficient algorithm for computing Gröbner bases \((F_4)\)
- Fault Analysis of Grain-128 by Targeting NFSR
- Practical Algebraic Attacks on the Hitag2 Stream Cipher
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - CRYPTO 2003
- Fast Software Encryption
- Cryptography and Coding
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function