Algebraic Cryptanalysis
From MaRDI portal
Publication:3532870
DOI10.1007/978-0-387-88757-9zbMath1183.94019OpenAlexW2913079528MaRDI QIDQ3532870
Publication date: 29 October 2008
Full work available at URL: https://doi.org/10.1007/978-0-387-88757-9
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Algebraic combinatorics (05E99) Algebraic systems of matrices (15A30) Algebraic structures (08A99)
Related Items (26)
Stream/block ciphers, difference equations and algebraic attacks ⋮ Polynomial-time algorithms for checking some properties of Boolean functions given by polynomials ⋮ Evaluation of Solving Time for Multivariate Quadratic Equation System Using XL Algorithm Over Small Finite Fields on GPU ⋮ On the Diffusion Property of Iterated Functions ⋮ Towards an operad-based cryptography: applications of commutative operads ⋮ On the arithmetic complexity of Strassen-like matrix multiplications ⋮ On black-box optimization in divide-and-conquer SAT solving ⋮ Mutant Differential Fault Analysis of Trivium MDFA ⋮ Algebraic Attacks Using Binary Decision Diagrams ⋮ Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures ⋮ Mod-2 dihedral Galois representations of prime conductor ⋮ Reconstructing a phylogenetic level-1 network from quartets ⋮ Finding Effective SAT Partitionings Via Black-Box Optimization ⋮ A novel keyed parallel hashing scheme based on a new chaotic system ⋮ New Algorithms for Learning in Presence of Errors ⋮ Parameterizing by the number of numbers ⋮ Unnamed Item ⋮ On propositional coding techniques for the distinguishability of objects in finite sets ⋮ Unnamed Item ⋮ A Variant of the F4 Algorithm ⋮ Unnamed Item ⋮ On conversions from CNF to ANF ⋮ Algebraic Cryptanalysis of Simplified AES∗ ⋮ An algebraic attack to the Bluetooth stream cipher \textsc{E0} ⋮ Determining whether a given cryptographic function is a permutation of another given cryptographic function -- a problem in intellectual property ⋮ Applications of SAT Solvers in Cryptanalysis: Finding Weak Keys and Preimages
Uses Software
This page was built for publication: Algebraic Cryptanalysis