Information Security and Cryptology - ICISC 2005
From MaRDI portal
Publication:5899294
DOI10.1007/11734727zbMATH Open1185.94049OpenAlexW2493058093MaRDI QIDQ5899294FDOQ5899294
Authors: Nicolas Courtois
Publication date: 2 May 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11734727
Recommendations
algebraic cryptanalysisBoolean functionsnonlinear filtersstream ciphersfast algebraic attacks on stream cipherssolving systems of multivariate equations
Cited In (15)
- On the security of the Feng-Liao-Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks
- Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks
- Breaking and Fixing Cryptophia’s Short Combiner
- Experimental and Efficient Algorithms
- Construction of balanced even-variable Boolean functions with optimal algebraic immunity
- Cryptanalysis of the CFVZ cryptosystem
- Cryptanalysis of the Compression Function of SIMD
- Cryptanalysis of a computer cryptography scheme based on a filter bank
- On the immunity of rotation symmetric Boolean functions against fast algebraic attacks
- A note on the optimal immunity of Boolean functions against fast algebraic attacks
- Results on highly nonlinear Boolean functions with provably good immunity to fast algebraic attacks
- A New Construction of Boolean Functions with Maximum Algebraic Immunity
- Structural cryptanalysis of SASAS
- New constructions of even-variable rotation symmetric Boolean functions with maximum algebraic immunity
- Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks
This page was built for publication: Information Security and Cryptology - ICISC 2005
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5899294)