Algorithmic Cryptanalysis
From MaRDI portal
Publication:5192642
DOI10.1201/9781420070033zbMath1172.94008OpenAlexW2913594971MaRDI QIDQ5192642
Publication date: 6 August 2009
Full work available at URL: https://doi.org/10.1201/9781420070033
elliptic curvescryptographystream cipherscryptanalysisWalsh transformbirthday paradoxnumber theoretic algorithmslattice reductionindex calculusbrute force cryptanalysis
Cryptography (94A60) Number-theoretic algorithms; complexity (11Y16) Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02)
Related Items (24)
Invariants for EA- and CCZ-equivalence of APN and AB functions ⋮ Semi-Regular Sequences and Other Random Systems of Equations ⋮ Correlation attacks on combination generators ⋮ Comparison of Cube Attacks Over Different Vector Spaces ⋮ An improved affine equivalence algorithm for random permutations ⋮ New discrete logarithm computation for the medium prime case using the function field sieve ⋮ On the arithmetic complexity of Strassen-like matrix multiplications ⋮ Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2 ⋮ Higher order differentiation over finite fields with applications to generalising the cube attack ⋮ Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks ⋮ Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x\) and some cryptographic applications] ⋮ Generic attacks on hash combiners ⋮ Generic attack on duplex-based AEAD modes using random function statistics ⋮ A practical key-recovery attack on 805-round Trivium ⋮ Recent progress on the elliptic curve discrete logarithm problem ⋮ Attacks Against Filter Generators Exploiting Monomial Mappings ⋮ An Improved Algebraic Attack on Hamsi-256 ⋮ Breaking Grain-128 with Dynamic Cube Attacks ⋮ Cryptanalysis of a quadratic knapsack cryptosystem ⋮ Finding small solutions of the equation \(Bx-Ay=z\) and its applications to cryptanalysis of the RSA cryptosystem ⋮ Faster Space-Efficient Algorithms for Subset Sum, $k$-Sum, and Related Problems ⋮ Characteristic vector and weight distribution of a linear code ⋮ Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\) ⋮ Cryptanalysis of stream cipher LIZARD using division property and MILP based cube attack
This page was built for publication: Algorithmic Cryptanalysis