Cryptography and Coding
From MaRDI portal
Publication:5897528
Recommendations
- Algebraic side-channel attacks
- Algebraic attacks using binary decision diagrams
- Fast Software Encryption
- Guess-and-determine attack and algebraic attack
- Fast Software Encryption
- Algebraic attacks from a Groebner basis perspective
- Algebraic attacks using SAT-solvers
- Algebraic Attacks Using IP-Solvers
Cited in
(6)- Algebraic Attacks Using IP-Solvers
- Results on the immunity of Boolean functions against probabilistic algebraic attacks
- On the efficiency of the probabilistic neutral bits method in statistical cryptanalysis of synchronous stream ciphers
- Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function
- Improving the lower bound on the maximum nonlinearity of 1-resilient Boolean functions and designing functions satisfying all cryptographic criteria
- Solving polynomial systems with noise over \(\mathbb{F}_2\): revisited
This page was built for publication: Cryptography and Coding
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5897528)