Cryptanalysis of Block Ciphers with Overdefined Systems of Equations

From MaRDI portal
Publication:4412803

DOI10.1007/3-540-36178-2_17zbMath1065.94543OpenAlexW1542020576WikidataQ55954596 ScholiaQ55954596MaRDI QIDQ4412803

Nicolas T. Courtois, Josef Pieprzyk

Publication date: 16 July 2003

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-36178-2_17




Related Items (96)

Stream/block ciphers, difference equations and algebraic attacksReversed genetic algorithms for generation of bijective s-boxes with good cryptographic propertiesInfluence of addition modulo \(2^n\) on algebraic attacksOn construction of efficient algorithms for solving systems of polynomial Boolean equations by testing a part of variablesCryptographic Analysis of All 4 × 4-Bit S-BoxesCryptanalysis of full LowMC and LowMC-M with algebraic techniquesPolly cracker, revisitedMaxMinMax problem and sparse equations over finite fieldsOn \((-1)\)-differential uniformity of ternary APN power functionsA new method for impossible differential cryptanalysis of 8-round advanced encryption standardBoolean ring cryptographic equation solvingSEA: A Scalable Encryption Algorithm for Small Embedded ApplicationsCryptanalysis of WG-7: a lightweight stream cipherA New Method for Solving Polynomial Systems with Noise over $\mathbb{F}_2$ and Its Applications in Cold Boot Key RecoveryImplicit Quadratic Property of Differentially 4-Uniform PermutationsLast Fall Degree, HFE, and Weil Descent Attacks on ECDLPAn application of combinatorics in cryptographyOn the Diffusion Property of Iterated FunctionsBasic theory in construction of Boolean functions with maximum possible annihilator immunityThe relationship between the level of affinity and cryptographic parameters of Boolean functionsOn a conjecture of differentially 8-uniform power functionsConstructing $8$-bit permutations, $8$-bit involutions and $8$-bit orthomorphisms with almost optimal cryptographic parametersAggregated differentials and cryptanalysis of PP-1 and GOSTQuaternary cryptographic bent functions and their binary projectionSolution theory for systems of bilinear equationsA combinatorial problem related to sparse systems of equationsAlgebraic attacks on a class of stream ciphers with unknown output functionNew constructions of even-variable rotation symmetric Boolean functions with maximum algebraic immunityOn algebraic immunity of trace inverse functions on finite fields of characteristic twoA SAT-based preimage analysis of reduced \textsc{Keccak} hash functionsFUTURE: a lightweight block cipher using an optimal diffusion matrixConditional Cube Searching and Applications on Trivium-Variant CiphersA Very Compact “Perfectly Masked” S-Box for AESOn the relation between the MXL family of algorithms and Gröbner basis algorithmsAlgebraic meet-in-the-middle attack on LowMCObtaining and solving systems of equations in key variables only for the small variants of AESLayout graphs, random walks and the \(t\)-wise independence of SPN block ciphersAlgebraic attacks on Rasta and Dasta using low-degree equationsUpper bound for algebraic immunity on a subclass of Maiorana McFarland class of bent functionsOn Cryptographically Significant Mappings over GF(2 n )Probabilistic analysis on Macaulay matrices over finite fields and complexity of constructing Gröbner basesOn the differential uniformities of functions over finite fieldsAlgebraic and Slide Attacks on KeeLoqA Meet-in-the-Middle Attack on 8-Round AESUnnamed ItemSecure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$Balanced \(2p\)-variable rotation symmetric Boolean functions with maximum algebraic immunityPSP: parallel sub-pipelined architecture for high throughput AES on FPGA and ASICA Five-Round Algebraic Property of the Advanced Encryption StandardAnalysis of Multivariate Hash FunctionsAlgebraic immunity for cryptographically significant Boolean functions: analysis and constructionCryptographic properties and application of a generalized unbalanced Feistel network structureA methodology for differential-linear cryptanalysis and its applicationsAlgebraic Attacks on the Courtois Toy CipherConstructions of even-variable RSBFs with optimal algebraic immunity and high nonlinearityEspresso: a stream cipher for 5G wireless communication systemsImproving the security and efficiency of block ciphers based on LS-designsAn improved degree evaluation method of NFSR-based cryptosystemsFast correlation attack on stream cipher ABC v3On the \(2^{m}\)-variable symmetric Boolean functions with maximum algebraic immunityConcatenating indicators of flats for designing cryptographic functionsScalable PP-1 block cipherEfficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic AttacksPenalized semidefinite programming for quadratically-constrained quadratic optimizationWeight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of VariablesAn Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good NonlinearityOn the Number of Linearly Independent Equations Generated by XLOn the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their GeneralizationsDesigning against a class of algebraic attacks on symmetric block ciphersThe differential spectrum of a class of power functions over finite fieldsPragmatism vs. Elegance: Comparing Two Approaches to Simple Power Attacks on AESAlgebraic Cryptanalysis of the Data Encryption StandardSolving non-linear Boolean equation systems by variable eliminationMRHS Equation SystemsOn the spectral immunity of periodic sequences restricted to binary annihilatorsPerfect nonlinear functions and cryptographyPhase transition of multivariate polynomial systemsFurther properties of several classes of Boolean functions with optimum algebraic immunityNew Description of SMS4 by an Embedding overGF(28)Cryptanalysis of CTC2Solving multiple right hand sides linear equationsCube Attacks on Tweakable Black Box PolynomialsHill Climbing Algorithms and TriviumCryptographic Properties and Application of a Generalized Unbalanced Feistel Network StructureA graph theoretic approach to construct desired cryptographic Boolean functionsPractical Algebraic Attacks on the Hitag2 Stream CipherA class of rotation symmetric Boolean functions with optimum algebraic immunityUnnamed Item3D: A Three-Dimensional Block CipherSpecific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known PlaintextsCryptanalysis of Rijndael S-box and improvementSpeeding up deciphering by hypergraph orderingLinear codes from vectorial Boolean functions in the context of algebraic attacksA new representation of S-boxes for algebraic differential cryptanalysisOn weak rotors, Latin squares, linear algebraic representations, invariant differentials and cryptanalysis of EnigmaAlgorithm 959




This page was built for publication: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations