메뉴 건너뛰기




Volumn 1, Issue , 1999, Pages 290-295

Using Walk-SAT and Rel-SAT for cryptographic key search

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC ALGORITHMS; CRYPTOGRAPHIC KEY; DATA ENCRYPTION STANDARD; PROPOSITIONAL LOGIC; RANDOM PROBLEM; SEARCH ALGORITHMS; SEARCH PROBLEM; SEARCH TECHNIQUE;

EID: 0343978359     PISSN: 10450823     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (38)

References (21)
  • 1
    • 19144369108 scopus 로고    scopus 로고
    • Programming satan's computer
    • Computer Science Today - Recent Trends and Developments, Springer-Verlag
    • R. Anderson & R. Needham. Programming satan's computer. In Computer Science Today - Recent Trends and Developments, LNCS 1000, pp. 426-440. Springer-Verlag, 1996.
    • (1996) LNCS , vol.1000 , pp. 426-440
    • Anderson, R.1    Needham, R.2
  • 2
    • 0020151766 scopus 로고
    • ON THE CRYPTANALYSIS OF ROTOR MACHINES AND SUBSTITUTION - PERMUTATION NETWORKS.
    • D. Andleman & J. Reeds. On the cryptanalysis of rotor machines and substitution-permutations networks. IEEE Trans, on Inf. Theory, 28(4):578-584, 1982. (Pubitemid 12525109)
    • (1982) IEEE Transactions on Information Theory , vol.IT-28 , Issue.4 , pp. 578-584
    • Andelman, D.1    Reeds, J.2
  • 4
    • 0031365466 scopus 로고    scopus 로고
    • Using CSP look-back techniques to solve real-world SAT instances
    • AAAI Press/The MIT Press
    • R. Bayardo & R. Schrag. Using CSP look-back techniques to solve real-world SAT instances, in Proc. ofAAAI-97. pp. 203-208. AAAI Press/The MIT Press, 1997.
    • (1997) Proc. of AAAI-97 , pp. 203-208
    • Bayardo, R.1    Schrag, R.2
  • 5
    • 0026397734 scopus 로고
    • Differential cryptanalisis of DES-like cryptosystems
    • E. Biham & A. Shamir. Differential cryptanalisis of DES-like cryptosystems. J of Crvptology 4(1): 3-72, 1991.
    • (1991) J of Crvptology , vol.4 , Issue.1 , pp. 3-72
    • Biham, E.1    Shamir, A.2
  • 6
    • 0022769976 scopus 로고
    • GRAPH-BASED ALGORITHMS FOR BOOLEAN FUNCTION MANIPULATION.
    • R. Bryant. Graph-based algorithms for boolean function manipulation. IEEE TOC, 35(8):677-691, 1986. (Pubitemid 16629996)
    • (1986) IEEE Transactions on Computers , vol.C-35 , Issue.8 , pp. 677-691
    • Bryant, R.E.1
  • 7
    • 0030108241 scopus 로고    scopus 로고
    • Experimental results on the crossover point in random 3SAT
    • J. Crawford &. L. Auton. Experimental results on the crossover point in random 3SAT. ALL 81(L2):31-57, 1996.
    • (1996) ALL , vol.81 , Issue.L2 , pp. 31-57
    • Crawford, J.1    Auton, L.2
  • 8
    • 0004356882 scopus 로고    scopus 로고
    • Finding hard instances of the satisfiability problem: A survey
    • Satisfiability Problem: Theory and Applications, AMS
    • S. Cook & D. Mitchel. Finding hard instances of the satisfiability problem: A survey. In Satisfiability Problem: Theory and Applications, DIMACS Series in Discr. Math. and TCS, 25:1-17. AMS, 1997.
    • (1997) DIMACS Series in Discr. Math. And TCS , vol.25 , pp. 1-17
    • Cook, S.1    Mitchel, D.2
  • 9
    • 0343978362 scopus 로고    scopus 로고
    • Technical report, Cryptography Research Inc., Available on the web at
    • DES key search project information. Technical report, Cryptography Research Inc., 1998. Available on the web at http://www.cryptography.com/des/.
    • (1998) DES Key Search Project Information
  • 10
    • 0016579870 scopus 로고
    • Some cryptographic techniques for machine-to-machine data communication
    • H. Feistel, W. Notz, and L. Smith. Some cryptographic techniques for machine-to-machine data communication. Proc. of the IEEE, 63(11): 1545 1554, 1975.
    • (1975) Proc. of the IEEE , vol.63 , Issue.11 , pp. 15451554
    • Feistel, H.1    Notz, W.2    Smith, L.3
  • 11
    • 0004287270 scopus 로고    scopus 로고
    • Committee on Payment, Settelment Systems, and the Group of Computer Experts of the Central Banks of the Group of Ten countries. Bank for International Settlements, Basle, August
    • Committee on Payment, Settelment Systems, and the Group of Computer Experts of the Central Banks of the Group of Ten countries. Security of Electronic Money. Bank for International Settlements, Basle, August 1996.
    • (1996) Security of Electronic Money
  • 14
    • 85028754650 scopus 로고
    • The first experimental cryptanalysis of the Data Encryption Standard
    • Proc. of CRYPTO-94, Springer Vei lag
    • M. Matsui. The first experimental cryptanalysis of the Data Encryption Standard. In Proc. of CRYPTO-94, LNCS 839, pp. 1-11." Springer Vei lag, 1994.
    • (1994) LNCS , vol.839 , pp. 1-11
    • Matsui, M.1
  • 15
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for des cipher
    • Proc. of Eurocrypt 93. Springer-Verlag
    • M. Matsui. Linear cryptanalysis method for des cipher. In Proc. of Eurocrypt 93. LNCS 765, pp. 368 397. Springer-Verlag, 1994.
    • (1994) LNCS , vol.765 , pp. 368397
    • Matsui, M.1
  • 16
    • 34248682000 scopus 로고    scopus 로고
    • Data encryption standard
    • NIST. National (U.S.) Bureau of Standards, Dec 1997. Supersedes FIPS PUB 46-1 of Jan. 1988 and FIPS PUB 46 of Jan. 1977
    • NIST. Data encryption standard. Federal Information Processing Standards Publications FIPS PUB 46-2, National (U.S.) Bureau of Standards, Dec 1997. Supersedes FIPS PUB 46-1 of Jan. 1988 and FIPS PUB 46 of Jan. 1977.
    • Federal Information Processing Standards Publications FIPS PUB 46-2
  • 17
    • 84880692868 scopus 로고    scopus 로고
    • Emerging market economy forum (EMEF): Report of the ministerial workshop on cryptography policy
    • OECD. Paris, Feb
    • OECD. Emerging market economy forum (EMEF): Report of the ministerial workshop on cryptography policy. OLIS SG/EMEF/ICCP(98)L Organization for Economic Co-operation and Development. Paris, Feb 1998.
    • (1998) OLIS SG/EMEF/ICCP(98)L Organization for Economic Co-operation and Development
  • 18
    • 0002219322 scopus 로고    scopus 로고
    • An attack on a recurive authentication protocol: A cautionary tale
    • P. Ryan & S. Schneider. An attack on a recurive authentication protocol: a cautionary tale. I PL, 65(15):7-16, 1998.
    • (1998) I PL , vol.65 , Issue.15 , pp. 7-16
    • Ryan, P.1    Schneider, S.2
  • 20
    • 0028574681 scopus 로고
    • Noise strategies for local search
    • AAAI Press/The MIT Press
    • B. Selman, H. Kautz, and B. Cohen. Noise strategies for local search. In Proc. of AAA I-94, pp. 337-343. AAAI Press/The MIT Press, 1994.
    • (1994) Proc. of AAA I-94 , pp. 337-343
    • Selman, B.1    Kautz, H.2    Cohen, B.3
  • 21
    • 0002186293 scopus 로고    scopus 로고
    • Ten challenges in propositional resoning and search
    • Morgan Kaufmann
    • B. Selman, H. Kautz, and D. McAllester. Ten challenges in propositional resoning and search. In Proc. UCAI-97, pp. n50 54. Morgan Kaufmann, 1997.
    • (1997) Proc. UCAI-97
    • Selman, B.1    Kautz, H.2    McAllester, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.