Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
From MaRDI portal
Publication:4412803
DOI10.1007/3-540-36178-2_17zbMath1065.94543OpenAlexW1542020576WikidataQ55954596 ScholiaQ55954596MaRDI QIDQ4412803
Nicolas T. Courtois, Josef Pieprzyk
Publication date: 16 July 2003
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-36178-2_17
Related Items (96)
Stream/block ciphers, difference equations and algebraic attacks ⋮ Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties ⋮ Influence of addition modulo \(2^n\) on algebraic attacks ⋮ On construction of efficient algorithms for solving systems of polynomial Boolean equations by testing a part of variables ⋮ Cryptographic Analysis of All 4 × 4-Bit S-Boxes ⋮ Cryptanalysis of full LowMC and LowMC-M with algebraic techniques ⋮ Polly cracker, revisited ⋮ MaxMinMax problem and sparse equations over finite fields ⋮ On \((-1)\)-differential uniformity of ternary APN power functions ⋮ A new method for impossible differential cryptanalysis of 8-round advanced encryption standard ⋮ Boolean ring cryptographic equation solving ⋮ SEA: A Scalable Encryption Algorithm for Small Embedded Applications ⋮ Cryptanalysis of WG-7: a lightweight stream cipher ⋮ A New Method for Solving Polynomial Systems with Noise over $\mathbb{F}_2$ and Its Applications in Cold Boot Key Recovery ⋮ Implicit Quadratic Property of Differentially 4-Uniform Permutations ⋮ Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP ⋮ An application of combinatorics in cryptography ⋮ On the Diffusion Property of Iterated Functions ⋮ Basic theory in construction of Boolean functions with maximum possible annihilator immunity ⋮ The relationship between the level of affinity and cryptographic parameters of Boolean functions ⋮ On a conjecture of differentially 8-uniform power functions ⋮ Constructing $8$-bit permutations, $8$-bit involutions and $8$-bit orthomorphisms with almost optimal cryptographic parameters ⋮ Aggregated differentials and cryptanalysis of PP-1 and GOST ⋮ Quaternary cryptographic bent functions and their binary projection ⋮ Solution theory for systems of bilinear equations ⋮ A combinatorial problem related to sparse systems of equations ⋮ Algebraic attacks on a class of stream ciphers with unknown output function ⋮ New constructions of even-variable rotation symmetric Boolean functions with maximum algebraic immunity ⋮ On algebraic immunity of trace inverse functions on finite fields of characteristic two ⋮ A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions ⋮ FUTURE: a lightweight block cipher using an optimal diffusion matrix ⋮ Conditional Cube Searching and Applications on Trivium-Variant Ciphers ⋮ A Very Compact “Perfectly Masked” S-Box for AES ⋮ On the relation between the MXL family of algorithms and Gröbner basis algorithms ⋮ Algebraic meet-in-the-middle attack on LowMC ⋮ Obtaining and solving systems of equations in key variables only for the small variants of AES ⋮ Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers ⋮ Algebraic attacks on Rasta and Dasta using low-degree equations ⋮ Upper bound for algebraic immunity on a subclass of Maiorana McFarland class of bent functions ⋮ On Cryptographically Significant Mappings over GF(2 n ) ⋮ Probabilistic analysis on Macaulay matrices over finite fields and complexity of constructing Gröbner bases ⋮ On the differential uniformities of functions over finite fields ⋮ Algebraic and Slide Attacks on KeeLoq ⋮ A Meet-in-the-Middle Attack on 8-Round AES ⋮ Unnamed Item ⋮ Secure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$ ⋮ Balanced \(2p\)-variable rotation symmetric Boolean functions with maximum algebraic immunity ⋮ PSP: parallel sub-pipelined architecture for high throughput AES on FPGA and ASIC ⋮ A Five-Round Algebraic Property of the Advanced Encryption Standard ⋮ Analysis of Multivariate Hash Functions ⋮ Algebraic immunity for cryptographically significant Boolean functions: analysis and construction ⋮ Cryptographic properties and application of a generalized unbalanced Feistel network structure ⋮ A methodology for differential-linear cryptanalysis and its applications ⋮ Algebraic Attacks on the Courtois Toy Cipher ⋮ Constructions of even-variable RSBFs with optimal algebraic immunity and high nonlinearity ⋮ Espresso: a stream cipher for 5G wireless communication systems ⋮ Improving the security and efficiency of block ciphers based on LS-designs ⋮ An improved degree evaluation method of NFSR-based cryptosystems ⋮ Fast correlation attack on stream cipher ABC v3 ⋮ On the \(2^{m}\)-variable symmetric Boolean functions with maximum algebraic immunity ⋮ Concatenating indicators of flats for designing cryptographic functions ⋮ Scalable PP-1 block cipher ⋮ Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks ⋮ Penalized semidefinite programming for quadratically-constrained quadratic optimization ⋮ Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables ⋮ An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity ⋮ On the Number of Linearly Independent Equations Generated by XL ⋮ On the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their Generalizations ⋮ Designing against a class of algebraic attacks on symmetric block ciphers ⋮ The differential spectrum of a class of power functions over finite fields ⋮ Pragmatism vs. Elegance: Comparing Two Approaches to Simple Power Attacks on AES ⋮ Algebraic Cryptanalysis of the Data Encryption Standard ⋮ Solving non-linear Boolean equation systems by variable elimination ⋮ MRHS Equation Systems ⋮ On the spectral immunity of periodic sequences restricted to binary annihilators ⋮ Perfect nonlinear functions and cryptography ⋮ Phase transition of multivariate polynomial systems ⋮ Further properties of several classes of Boolean functions with optimum algebraic immunity ⋮ New Description of SMS4 by an Embedding overGF(28) ⋮ Cryptanalysis of CTC2 ⋮ Solving multiple right hand sides linear equations ⋮ Cube Attacks on Tweakable Black Box Polynomials ⋮ Hill Climbing Algorithms and Trivium ⋮ Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure ⋮ A graph theoretic approach to construct desired cryptographic Boolean functions ⋮ Practical Algebraic Attacks on the Hitag2 Stream Cipher ⋮ A class of rotation symmetric Boolean functions with optimum algebraic immunity ⋮ Unnamed Item ⋮ 3D: A Three-Dimensional Block Cipher ⋮ Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts ⋮ Cryptanalysis of Rijndael S-box and improvement ⋮ Speeding up deciphering by hypergraph ordering ⋮ Linear codes from vectorial Boolean functions in the context of algebraic attacks ⋮ A new representation of S-boxes for algebraic differential cryptanalysis ⋮ On weak rotors, Latin squares, linear algebraic representations, invariant differentials and cryptanalysis of Enigma ⋮ Algorithm 959
This page was built for publication: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations