Advances in Cryptology - CRYPTO 2003
From MaRDI portal
Publication:5428118
DOI10.1007/b11817zbMath1122.94365OpenAlexW2480001466WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428118
Publication date: 28 November 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b11817
nonlinear filtersstream ciphersBoolean functionsBerlekamp-Massey algorithmLILI-128BluetoothE0multivariate equationsCryptrecNessieAlgebraic attacksToyocryptcombiners with memoryLFSR synthesis
Shift register sequences and sequences over finite alphabets in information and communication theory (94A55) Cryptography (94A60)
Related Items (only showing first 100 items - show all)
Conditional Cube Searching and Applications on Trivium-Variant Ciphers ⋮ A lower bound on the third-order nonlinearity of the simplest \(\mathcal{PS}_{a p}\) bent functions ⋮ Towards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipher ⋮ Algebraic attacks on Rasta and Dasta using low-degree equations ⋮ Об одном методе построения следствий специального вида для систем булевых уравнений;On a method to construct special type corollaries for systems of Boolean equations ⋮ On the spectral immunity of periodic sequences restricted to binary annihilators ⋮ The method for constructing uniform planar approximations of the filter generator ⋮ On the fast algebraic immunity of threshold functions ⋮ Cryptanalysis of the class of maximum period Galois NLFSR-based stream ciphers ⋮ Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions ⋮ A construction of 1-resilient Boolean functions with good cryptographic properties ⋮ The Cryptographic Power of Random Selection ⋮ Linearization of nonlinear filter generators and its application to cryptanalysis of stream ciphers ⋮ An algebraic attack on the improved summation generator with 2-bit memory ⋮ Low-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2\)] ⋮ Correlation attacks on combination generators ⋮ State cycles, initialization and the Trivium stream cipher ⋮ Cryptanalysis of WG-7: a lightweight stream cipher ⋮ Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme ⋮ Constructing even-variable RSBFs with higher nonlinearity, optimal AI and almost optimal FAI ⋮ Balanced \(2p\)-variable rotation symmetric Boolean functions with optimal algebraic immunity ⋮ Basic theory in construction of Boolean functions with maximum possible annihilator immunity ⋮ Boolean functions of an odd number of variables with maximum algebraic immunity ⋮ Boolean functions with maximum algebraic immunity: further extensions of the Carlet-Feng construction ⋮ Secondary constructions of Boolean functions with maximum algebraic immunity ⋮ Improved multi-pass fast correlation attacks with applications ⋮ Fast algebraic immunity of Boolean functions ⋮ Algebraic attacks on a class of stream ciphers with unknown output function ⋮ A necessary and sufficient condition for a class of nonsingular Galois NFSRs ⋮ Improving the high order nonlinearity lower bound for Boolean functions with given algebraic immunity ⋮ Improved filter permutators for efficient FHE: better instances and implementations ⋮ The cycle structure of \(\mathrm{NFSR}(f^d)\) and its applications ⋮ Properties of a Family of Cryptographic Boolean Functions ⋮ Algebraic Attacks Using Binary Decision Diagrams ⋮ Constructing odd-variable RSBFs with optimal algebraic immunity, good nonlinearity and good behavior against fast algebraic attacks ⋮ On algebraic immunity of trace inverse functions on finite fields of characteristic two ⋮ Open Questions on Nonlinearity and on APN Functions ⋮ Cryptographic properties of the hidden weighted bit function ⋮ Boolean functions optimizing most of the cryptographic criteria ⋮ On designated-weight Boolean functions with highest algebraic immunity ⋮ The Stream Cipher HC-128 ⋮ A construction of highly nonlinear Boolean functions with optimal algebraic immunity and low hardware implementation cost ⋮ Algebraic Attacks against Random Local Functions and Their Countermeasures ⋮ On the affine equivalence relation between two classes of Boolean functions with optimal algebraic immunity ⋮ Upper bound for algebraic immunity on a subclass of Maiorana McFarland class of bent functions ⋮ A Note on the Optimal Immunity of Boolean Functions Against Fast Algebraic Attacks ⋮ A combinatorial condition and Boolean functions with optimal algebraic immunity ⋮ A note on determine the greatest common subfamily of two NFSRs by Gröbner basis ⋮ On the construction of multi-output Boolean functions with optimal algebraic immunity ⋮ A matrix construction of Boolean functions with maximum algebraic immunity ⋮ On the inverses of Kasami and Bracken-Leander exponents ⋮ On the security of the Feng-Liao-Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks ⋮ A new method to construct Boolean functions with good cryptographic properties ⋮ On Computing the Immunity of Boolean Power Functions Against Fast Algebraic Attacks ⋮ Concatenations of the hidden weighted bit function and their cryptographic properties ⋮ Recent results on constructing Boolean functions with (potentially) optimal algebraic immunity based on decompositions of finite fields ⋮ Algebraic immunity for cryptographically significant Boolean functions: analysis and construction ⋮ A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation ⋮ The Tu-Deng conjecture holds almost surely ⋮ Enhanced Boolean functions suitable for the filter model of pseudo-random generator ⋮ Attacks Against Filter Generators Exploiting Monomial Mappings ⋮ Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks ⋮ Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function ⋮ Constructions of even-variable RSBFs with optimal algebraic immunity and high nonlinearity ⋮ Improving algebraic attacks on stream ciphers based on linear feedback shift register over \(\mathbb{F}_{2^k}\) ⋮ An improved degree evaluation method of NFSR-based cryptosystems ⋮ Practical cryptanalysis of Bluetooth encryption with condition masking ⋮ A systematic method of constructing Boolean functions with optimal algebraic immunity based on the generator matrix of the Reed-Muller code ⋮ WG: a family of stream ciphers with designed randomness properties ⋮ On the \(2^{m}\)-variable symmetric Boolean functions with maximum algebraic immunity ⋮ A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity ⋮ Balanced \(2^k\)-variable rotation symmetric Boolean functions with optimal algebraic immunity ⋮ Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher ⋮ Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks ⋮ Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks ⋮ Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables ⋮ Self-shrinking chaotic stream ciphers ⋮ An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity ⋮ Sequences, DFT and Resistance against Fast Algebraic Attacks ⋮ On the Number of Linearly Independent Equations Generated by XL ⋮ Algebraic Cryptanalysis of the Data Encryption Standard ⋮ Improving the lower bound on the maximum nonlinearity of 1-resilient Boolean functions and designing functions satisfying all cryptographic criteria ⋮ Hybrid classes of balanced Boolean functions with good cryptographic properties ⋮ Randomness and Representation of Span n Sequences ⋮ A survey on nonlinear Boolean functions with optimal algebraic immunity suitable for stream ciphers ⋮ Extended BDD-Based Cryptanalysis of Keystream Generators ⋮ Further properties of several classes of Boolean functions with optimum algebraic immunity ⋮ Construction of balanced even-variable Boolean functions with optimal algebraic immunity ⋮ On algebraic properties of S-boxes designed by means of disjoint linear codes ⋮ X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs ⋮ Efficient probabilistic algorithm for estimating the algebraic properties of Boolean functions for large \(n\) ⋮ Cryptanalysis of CTC2 ⋮ Maximal values of generalized algebraic immunity ⋮ On the immunity of rotation symmetric Boolean functions against fast algebraic attacks ⋮ Cube Attacks on Tweakable Black Box Polynomials ⋮ Cryptanalysis of an E0-like combiner with memory ⋮ An algorithm for the spectral immunity of binary sequence with period 2 n ⋮ Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers ⋮ Constructing de Bruijn Sequences Based on a New Necessary Condition ⋮ A class of rotation symmetric Boolean functions with optimum algebraic immunity
This page was built for publication: Advances in Cryptology - CRYPTO 2003