scientific article; zbMATH DE number 1950612
From MaRDI portal
Publication:4413323
zbMath1031.94515MaRDI QIDQ4413323
Publication date: 17 July 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2587/25870182.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Gröbner basesstream ciphersnonlinear filteringmultivariate cryptographyMQ problempseudo-random generatorsXL algorithmciphertext-only attacksCryptrecoverdefined systems of multivariate equationsToyocrypt-HR1Toyocrypt-HS1
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Gröbner bases; other bases for ideals and modules (e.g., Janet and border bases) (13P10)
Related Items
Improved lower bound for algebraic immunity of a subclass of MM bent Boolean functions ⋮ On third-order nonlinearity of biquadratic monomial Boolean functions ⋮ Boolean ring cryptographic equation solving ⋮ An algebraic attack on the improved summation generator with 2-bit memory ⋮ Cryptanalysis of WG-7: a lightweight stream cipher ⋮ On the lower bounds of the second order nonlinearities of some Boolean functions ⋮ Third-order nonlinearities of a subclass of Kasami functions ⋮ Algebraic attacks on a class of stream ciphers with unknown output function ⋮ Improved filter permutators for efficient FHE: better instances and implementations ⋮ A characteristic set method for solving Boolean equations and applications in cryptanalysis of stream ciphers ⋮ An algorithm for solving over-determined multivariate quadratic systems over finite fields ⋮ A lower bound on the third-order nonlinearity of the simplest \(\mathcal{PS}_{a p}\) bent functions ⋮ The Stream Cipher HC-128 ⋮ Learning with physical rounding for linear and quadratic leakage functions ⋮ On Cryptographically Significant Mappings over GF(2 n ) ⋮ On the efficiency of solving Boolean polynomial systems with the characteristic set method ⋮ Analysis of Multivariate Hash Functions ⋮ A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation ⋮ Higher-order nonlinearity of Kasami functions ⋮ Sequences, DFT and Resistance against Fast Algebraic Attacks ⋮ On the Number of Linearly Independent Equations Generated by XL ⋮ On the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their Generalizations ⋮ On second-order nonlinearity and maximum algebraic immunity of some bent functions in \(\mathcal{PS}^{+}\) ⋮ Improving lower bounds on the second-order nonlinearity of three classes of Boolean functions ⋮ A new post-quantum multivariate polynomial public key encapsulation algorithm ⋮ Algebraic attacks on grain-like keystream generators
Uses Software