Algebraic Cryptanalysis

From MaRDI portal
Publication:3532870

DOI10.1007/978-0-387-88757-9zbMath1183.94019OpenAlexW2913079528MaRDI QIDQ3532870

Gregory V. Bard

Publication date: 29 October 2008

Full work available at URL: https://doi.org/10.1007/978-0-387-88757-9




Related Items (26)

Stream/block ciphers, difference equations and algebraic attacksPolynomial-time algorithms for checking some properties of Boolean functions given by polynomialsEvaluation of Solving Time for Multivariate Quadratic Equation System Using XL Algorithm Over Small Finite Fields on GPUOn the Diffusion Property of Iterated FunctionsTowards an operad-based cryptography: applications of commutative operadsOn the arithmetic complexity of Strassen-like matrix multiplicationsOn black-box optimization in divide-and-conquer SAT solvingMutant Differential Fault Analysis of Trivium MDFAAlgebraic Attacks Using Binary Decision DiagramsFull analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasuresMod-2 dihedral Galois representations of prime conductorReconstructing a phylogenetic level-1 network from quartetsFinding Effective SAT Partitionings Via Black-Box OptimizationA novel keyed parallel hashing scheme based on a new chaotic systemNew Algorithms for Learning in Presence of ErrorsParameterizing by the number of numbersUnnamed ItemOn propositional coding techniques for the distinguishability of objects in finite setsUnnamed ItemA Variant of the F4 AlgorithmUnnamed ItemOn conversions from CNF to ANFAlgebraic Cryptanalysis of Simplified AES∗An algebraic attack to the Bluetooth stream cipher \textsc{E0}Determining whether a given cryptographic function is a permutation of another given cryptographic function -- a problem in intellectual propertyApplications of SAT Solvers in Cryptanalysis: Finding Weak Keys and Preimages


Uses Software



This page was built for publication: Algebraic Cryptanalysis