Advances in Cryptology - CRYPTO 2003

From MaRDI portal
Publication:5428118

DOI10.1007/b11817zbMath1122.94365OpenAlexW2480001466WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428118

Nicolas T. Courtois

Publication date: 28 November 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b11817




Related Items (only showing first 100 items - show all)

Conditional Cube Searching and Applications on Trivium-Variant CiphersA lower bound on the third-order nonlinearity of the simplest \(\mathcal{PS}_{a p}\) bent functionsTowards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipherAlgebraic attacks on Rasta and Dasta using low-degree equationsОб одном методе построения следствий специального вида для систем булевых уравнений;On a method to construct special type corollaries for systems of Boolean equationsOn the spectral immunity of periodic sequences restricted to binary annihilatorsThe method for constructing uniform planar approximations of the filter generatorOn the fast algebraic immunity of threshold functionsCryptanalysis of the class of maximum period Galois NLFSR-based stream ciphersEnhanced criteria on differential uniformity and nonlinearity of cryptographically significant functionsA construction of 1-resilient Boolean functions with good cryptographic propertiesThe Cryptographic Power of Random SelectionLinearization of nonlinear filter generators and its application to cryptanalysis of stream ciphersAn algebraic attack on the improved summation generator with 2-bit memoryLow-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2\)] ⋮ Correlation attacks on combination generatorsState cycles, initialization and the Trivium stream cipherCryptanalysis of WG-7: a lightweight stream cipherCryptanalysis of a Chaotic Stream Cipher and Its Improved SchemeConstructing even-variable RSBFs with higher nonlinearity, optimal AI and almost optimal FAIBalanced \(2p\)-variable rotation symmetric Boolean functions with optimal algebraic immunityBasic theory in construction of Boolean functions with maximum possible annihilator immunityBoolean functions of an odd number of variables with maximum algebraic immunityBoolean functions with maximum algebraic immunity: further extensions of the Carlet-Feng constructionSecondary constructions of Boolean functions with maximum algebraic immunityImproved multi-pass fast correlation attacks with applicationsFast algebraic immunity of Boolean functionsAlgebraic attacks on a class of stream ciphers with unknown output functionA necessary and sufficient condition for a class of nonsingular Galois NFSRsImproving the high order nonlinearity lower bound for Boolean functions with given algebraic immunityImproved filter permutators for efficient FHE: better instances and implementationsThe cycle structure of \(\mathrm{NFSR}(f^d)\) and its applicationsProperties of a Family of Cryptographic Boolean FunctionsAlgebraic Attacks Using Binary Decision DiagramsConstructing odd-variable RSBFs with optimal algebraic immunity, good nonlinearity and good behavior against fast algebraic attacksOn algebraic immunity of trace inverse functions on finite fields of characteristic twoOpen Questions on Nonlinearity and on APN FunctionsCryptographic properties of the hidden weighted bit functionBoolean functions optimizing most of the cryptographic criteriaOn designated-weight Boolean functions with highest algebraic immunityThe Stream Cipher HC-128A construction of highly nonlinear Boolean functions with optimal algebraic immunity and low hardware implementation costAlgebraic Attacks against Random Local Functions and Their CountermeasuresOn the affine equivalence relation between two classes of Boolean functions with optimal algebraic immunityUpper bound for algebraic immunity on a subclass of Maiorana McFarland class of bent functionsA Note on the Optimal Immunity of Boolean Functions Against Fast Algebraic AttacksA combinatorial condition and Boolean functions with optimal algebraic immunityA note on determine the greatest common subfamily of two NFSRs by Gröbner basisOn the construction of multi-output Boolean functions with optimal algebraic immunityA matrix construction of Boolean functions with maximum algebraic immunityOn the inverses of Kasami and Bracken-Leander exponentsOn the security of the Feng-Liao-Yang Boolean functions with optimal algebraic immunity against fast algebraic attacksA new method to construct Boolean functions with good cryptographic propertiesOn Computing the Immunity of Boolean Power Functions Against Fast Algebraic AttacksConcatenations of the hidden weighted bit function and their cryptographic propertiesRecent results on constructing Boolean functions with (potentially) optimal algebraic immunity based on decompositions of finite fieldsAlgebraic immunity for cryptographically significant Boolean functions: analysis and constructionA design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementationThe Tu-Deng conjecture holds almost surelyEnhanced Boolean functions suitable for the filter model of pseudo-random generatorAttacks Against Filter Generators Exploiting Monomial MappingsTwo constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacksAlgebraic cryptanalysis of stream ciphers using decomposition of Boolean functionConstructions of even-variable RSBFs with optimal algebraic immunity and high nonlinearityImproving algebraic attacks on stream ciphers based on linear feedback shift register over \(\mathbb{F}_{2^k}\)An improved degree evaluation method of NFSR-based cryptosystemsPractical cryptanalysis of Bluetooth encryption with condition maskingA systematic method of constructing Boolean functions with optimal algebraic immunity based on the generator matrix of the Reed-Muller codeWG: a family of stream ciphers with designed randomness propertiesOn the \(2^{m}\)-variable symmetric Boolean functions with maximum algebraic immunityA conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunityBalanced \(2^k\)-variable rotation symmetric Boolean functions with optimal algebraic immunityCryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipherEfficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic AttacksMutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic AttacksWeight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of VariablesSelf-shrinking chaotic stream ciphersAn Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good NonlinearitySequences, DFT and Resistance against Fast Algebraic AttacksOn the Number of Linearly Independent Equations Generated by XLAlgebraic Cryptanalysis of the Data Encryption StandardImproving the lower bound on the maximum nonlinearity of 1-resilient Boolean functions and designing functions satisfying all cryptographic criteriaHybrid classes of balanced Boolean functions with good cryptographic propertiesRandomness and Representation of Span n SequencesA survey on nonlinear Boolean functions with optimal algebraic immunity suitable for stream ciphersExtended BDD-Based Cryptanalysis of Keystream GeneratorsFurther properties of several classes of Boolean functions with optimum algebraic immunityConstruction of balanced even-variable Boolean functions with optimal algebraic immunityOn algebraic properties of S-boxes designed by means of disjoint linear codesX-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRsEfficient probabilistic algorithm for estimating the algebraic properties of Boolean functions for large \(n\)Cryptanalysis of CTC2Maximal values of generalized algebraic immunityOn the immunity of rotation symmetric Boolean functions against fast algebraic attacksCube Attacks on Tweakable Black Box PolynomialsCryptanalysis of an E0-like combiner with memoryAn algorithm for the spectral immunity of binary sequence with period 2 nAlgebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift RegistersConstructing de Bruijn Sequences Based on a New Necessary ConditionA class of rotation symmetric Boolean functions with optimum algebraic immunity




This page was built for publication: Advances in Cryptology - CRYPTO 2003