Information Security and Cryptology - ICISC 2005
From MaRDI portal
Publication:5899294
Recommendations
Cited in
(15)- On the security of the Feng-Liao-Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks
- Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks
- Breaking and Fixing Cryptophia’s Short Combiner
- Construction of balanced even-variable Boolean functions with optimal algebraic immunity
- Experimental and Efficient Algorithms
- Cryptanalysis of the CFVZ cryptosystem
- Cryptanalysis of a computer cryptography scheme based on a filter bank
- Cryptanalysis of the Compression Function of SIMD
- On the immunity of rotation symmetric Boolean functions against fast algebraic attacks
- A note on the optimal immunity of Boolean functions against fast algebraic attacks
- Results on highly nonlinear Boolean functions with provably good immunity to fast algebraic attacks
- A New Construction of Boolean Functions with Maximum Algebraic Immunity
- Structural cryptanalysis of SASAS
- New constructions of even-variable rotation symmetric Boolean functions with maximum algebraic immunity
- Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks
This page was built for publication: Information Security and Cryptology - ICISC 2005
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5899294)