scientific article; zbMATH DE number 1950612

From MaRDI portal
Publication:4413323

zbMath1031.94515MaRDI QIDQ4413323

Nicolas T. Courtois

Publication date: 17 July 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2587/25870182.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Improved lower bound for algebraic immunity of a subclass of MM bent Boolean functionsOn third-order nonlinearity of biquadratic monomial Boolean functionsBoolean ring cryptographic equation solvingAn algebraic attack on the improved summation generator with 2-bit memoryCryptanalysis of WG-7: a lightweight stream cipherOn the lower bounds of the second order nonlinearities of some Boolean functionsThird-order nonlinearities of a subclass of Kasami functionsAlgebraic attacks on a class of stream ciphers with unknown output functionImproved filter permutators for efficient FHE: better instances and implementationsA characteristic set method for solving Boolean equations and applications in cryptanalysis of stream ciphersAn algorithm for solving over-determined multivariate quadratic systems over finite fieldsA lower bound on the third-order nonlinearity of the simplest \(\mathcal{PS}_{a p}\) bent functionsThe Stream Cipher HC-128Learning with physical rounding for linear and quadratic leakage functionsOn Cryptographically Significant Mappings over GF(2 n )On the efficiency of solving Boolean polynomial systems with the characteristic set methodAnalysis of Multivariate Hash FunctionsA design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementationHigher-order nonlinearity of Kasami functionsSequences, DFT and Resistance against Fast Algebraic AttacksOn the Number of Linearly Independent Equations Generated by XLOn the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their GeneralizationsOn second-order nonlinearity and maximum algebraic immunity of some bent functions in \(\mathcal{PS}^{+}\)Improving lower bounds on the second-order nonlinearity of three classes of Boolean functionsA new post-quantum multivariate polynomial public key encapsulation algorithmAlgebraic attacks on grain-like keystream generators


Uses Software