Advances in Cryptology – CRYPTO 2004
From MaRDI portal
Publication:5311546
DOI10.1007/B99099zbMATH Open1104.94023DBLPconf/crypto/2004OpenAlexW2477011922MaRDI QIDQ5311546FDOQ5311546
Authors: Philip Hawkes, Gregory G. Rose
Publication date: 23 August 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b99099
Recommendations
- Algebraic attacks on stream ciphers: recent developments and new results
- Advances in Cryptology - CRYPTO 2003
- Algebraic attacks on Trivium-like stream ciphers
- Algebraic attacks on a class of stream ciphers with unknown output function
- Algebraic Attacks on Clock-Controlled Stream Ciphers
- Algebraic attacks on stream ciphers with Gröbner bases
- Coding and Cryptography
- scientific article; zbMATH DE number 2009966
- Progress in Cryptology – Mycrypt 2005
- Stream/block ciphers, difference equations and algebraic attacks
Cited In (35)
- On the security of the Feng-Liao-Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks
- Sequences, DFT and Resistance against Fast Algebraic Attacks
- Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks
- Constructions of even-variable RSBFs with optimal algebraic immunity and high nonlinearity
- Cryptanalysis of the class of maximum period Galois NLFSR-based stream ciphers
- A Survey of Recent Attacks on the Filter Generator
- Fast near collision attack on the Grain v1 stream cipher
- On Attacks on Filtering Generators Using Linear Subspace Structures
- The Linear Vector Space Spanned by the Nonlinear Filter Generator
- Cryptanalysis of an E0-like combiner with memory
- Cryptanalysis of WG-7: a lightweight stream cipher
- Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks
- Constructing odd-variable RSBFs with optimal algebraic immunity, good nonlinearity and good behavior against fast algebraic attacks
- An algorithm for the spectral immunity of binary sequence with period \(2^n\)
- Properties of a family of cryptographic Boolean functions
- A survey on nonlinear Boolean functions with optimal algebraic immunity suitable for stream ciphers
- Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function
- Balanced \(2p\)-variable rotation symmetric Boolean functions with optimal algebraic immunity
- Cryptographic properties of the hidden weighted bit function
- Concatenations of the hidden weighted bit function and their cryptographic properties
- A systematic method of constructing Boolean functions with optimal algebraic immunity based on the generator matrix of the Reed-Muller code
- Results on highly nonlinear Boolean functions with provably good immunity to fast algebraic attacks
- An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity
- Improved multi-pass fast correlation attacks with applications
- Fast Software Encryption
- Enhanced Boolean functions suitable for the filter model of pseudo-random generator
- Constructions of balanced odd-variable rotation symmetric Boolean functions with optimal algebraic immunity and high nonlinearity
- Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks
- Algebraic attacks on a class of stream ciphers with unknown output function
- An enhanced binary characteristic set algorithm and its applications to algebraic cryptanalysis
- Progress in Cryptology – Mycrypt 2005
- A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation
- On the fast algebraic immunity of threshold functions
- Improving algebraic attacks on stream ciphers based on linear feedback shift register over \(\mathbb{F}_{2^k}\)
- A construction of highly nonlinear Boolean functions with optimal algebraic immunity and low hardware implementation cost
This page was built for publication: Advances in Cryptology – CRYPTO 2004
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5311546)