메뉴 건너뛰기




Volumn 3506, Issue , 2005, Pages 3-20

Algebraic attacks on combiners with memory and several outputs

Author keywords

Algebraic cryptanalysis; Boolean functions; Combiners with memory; E0; LFSR based stream ciphers; LILI 128; Snow; Turing cipher

Indexed keywords

BOOLEAN FUNCTIONS; COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; SNOW; THEOREM PROVING; TURING MACHINES;

EID: 24944457137     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11496618_3     Document Type: Conference Paper
Times cited : (41)

References (38)
  • 2
    • 35248840147 scopus 로고    scopus 로고
    • Algebraic atacks on combiners with memory
    • Crypto 2003, Springer
    • Fvederik Armknecht, Matthias Krause: Algebraic Atacks on Combiners with Memory, Crypto 2003, LNCS 2729, pp. 162-176, Springer.
    • LNCS , vol.2729 , pp. 162-176
    • Armknecht, F.1    Krause, M.2
  • 3
    • 35048861887 scopus 로고    scopus 로고
    • Improving fast algebraic attacks
    • FSE 2004
    • Frederik Armknecht: Improving Fast Algebraic Attacks, FSE 2004, LNCS, 2004.
    • (2004) LNCS
    • Armknecht, F.1
  • 4
    • 84948981360 scopus 로고    scopus 로고
    • Searching for the optimum correlation attack
    • FSE'94, Springer
    • Ross Anderson: Searching for the Optimum Correlation Attack, FSE'94, LNCS 1008, Springer, pp 137-143.
    • LNCS , vol.1008 , pp. 137-143
    • Anderson, R.1
  • 5
    • 35248861711 scopus 로고    scopus 로고
    • Instant ciphertext-only cryptanalysis of GSM encrypted communication
    • Crypto 2003
    • Elad Barkan, Eli Biham, and Nathan Keller: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication, Crypto 2003, LNCS 2729, pp. 600-616.
    • LNCS , vol.2729 , pp. 600-616
    • Barkan, E.1    Biham, E.2    Keller, N.3
  • 7
    • 48249094732 scopus 로고    scopus 로고
    • Guess and determine attack on SNOW
    • 12/11, NES/DOC/KUL/WP5/011/a
    • Christophe De Canniere, Guess and Determine Attack on SNOW, Nessie public report, 12/11/2001, NES/DOC/KUL/WP5/011/a, available from www.cryptonessie.org.
    • (2001) Nessie Public Report
    • De Canniere, C.1
  • 8
    • 24944514161 scopus 로고    scopus 로고
    • On a new notion of nonlinearity relevant to multi-output pseudo-random generators
    • SAC 2003
    • Claude Carlet, Emmanuel Prouff: On a new notion of nonlinearity relevant to multi-output pseudo-random generators, SAC 2003, LNCS 3006, pp. 291-305.
    • LNCS , vol.3006 , pp. 291-305
    • Carlet, C.1    Prouff, E.2
  • 9
    • 35048845264 scopus 로고    scopus 로고
    • Algebraic attacks and decomposition of boolean functions
    • Eurocrypt 2004, Springer
    • Will Meier, Enes Pasalic and Claude Carlet: Algebraic Attacks and Decomposition of Boolean Functions, In Eurocrypt 2004, pp. 474-491, LNCS 3027, Springer, 2004.
    • (2004) LNCS , vol.3027 , pp. 474-491
    • Meier, W.1    Pasalic, E.2    Carlet, C.3
  • 10
    • 84937397479 scopus 로고    scopus 로고
    • Cryptanalysis of stream ciphers with linear masking
    • Crypto 2002, Springer
    • Don Coppersmith, Shai Halevi and Charanjit Jutla, Cryptanalysis of stream ciphers with linear masking, Crypto 2002, LNCS 2442, Springer, 2002. Available at http://eprint.iacr.org/2002/020/
    • (2002) LNCS , vol.2442
    • Coppersmith, D.1    Halevi, S.2    Jutla, C.3
  • 11
    • 85002229923 scopus 로고    scopus 로고
    • On correlation-immune functions
    • Crypto'91, Springer
    • Paul Camion, Claude Carlet, Pascale Charpin and Nicolas Sendrier, On Correlation-immune Functions, Crypto'91, LNCS 576, Springer, pp. 86-100.
    • LNCS , vol.576 , pp. 86-100
    • Camion, P.1    Carlet, C.2    Charpin, P.3    Sendrier, N.4
  • 12
    • 85023205150 scopus 로고
    • Matrix multiplication via arithmetic progressions
    • Don Coppersmith, Shmuel Winograd: Matrix multiplication via arithmetic progressions, J. Symbolic Computation (1990), 9, pp. 251-280.
    • (1990) J. Symbolic Computation , vol.9 , pp. 251-280
    • Coppersmith, D.1    Winograd, S.2
  • 13
    • 84937560136 scopus 로고    scopus 로고
    • The security of Hidden Field Equations (HFE)
    • Cryptographers' Track Rsa Conference 2001, Springer
    • Nicolas Courtois: The security of Hidden Field Equations (HFE), Cryptographers' Track Rsa Conference 2001, LNCS 2020, Springer, pp. 266-281.
    • LNCS , vol.2020 , pp. 266-281
    • Courtois, N.1
  • 14
    • 35248828626 scopus 로고    scopus 로고
    • Higher order correlation attacks, XL algorithm and cryptanalysis of toyocrypt
    • ICISC 2002, Springer
    • Nicolas Courtois: Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt, ICISC 2002, LNCS 2587, pp. 182-199, Springer.
    • LNCS , vol.2587 , pp. 182-199
    • Courtois, N.1
  • 15
    • 35248820612 scopus 로고    scopus 로고
    • Algebraic attacks on stream ciphers with linear feedback
    • Eurocrypt 2003, Warsaw, Poland, Springer
    • Nicolas Courtois and Willi Meier: Algebraic Attacks on Stream Ciphers with Linear Feedback, Eurocrypt 2003, Warsaw, Poland, LNCS 2656, pp. 345-359, Springer. An extended version is available at http://www.minrank.org/toyolili. pdf
    • LNCS , vol.2656 , pp. 345-359
    • Courtois, N.1    Meier, W.2
  • 16
    • 35248849880 scopus 로고    scopus 로고
    • Fast algebraic attacks on stream ciphers with linear feedback
    • Crypto 2003, Springer
    • Nicolas Courtois: Fast Algebraic Attacks on Stream Ciphers with Linear Feedback, Crypto 2003, LNCS 2729, pp: 177-194, Springer.
    • LNCS , vol.2729 , pp. 177-194
    • Courtois, N.1
  • 17
    • 24944520994 scopus 로고    scopus 로고
    • The inverse S-box, non-linear polynomial relations and cryptanalysis of block ciphers
    • AES 4 Conference, Springer
    • Nicolas Courtois: The Inverse S-box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers, in AES 4 Conference, LNCS, Springer.
    • LNCS
    • Courtois, N.1
  • 18
    • 24944502519 scopus 로고    scopus 로고
    • General principles of algebraic attacks and new design criteria for components of symmetric ciphers
    • AES 4 Conference, Springer
    • Nicolas Courtois: General Principles of Algebraic Attacks and New Design Criteria for Components of Symmetric Ciphers, in AES 4 Conference, LNCS, Springer.
    • LNCS
    • Courtois, N.1
  • 19
    • 84958765510 scopus 로고    scopus 로고
    • Cryptanalysis of block ciphers with overdefined systems of equations
    • Asiacrypt 2002, Springer
    • Nicolas Courtois and Josef Pieprzyk, Cryptanalysis of Block Ciphers with Overdefined Systems of Equations, Asiacrypt 2002, LNCS 2501, pp.267-287, Springer.
    • LNCS , vol.2501 , pp. 267-287
    • Courtois, N.1    Pieprzyk, J.2
  • 21
    • 35248828702 scopus 로고    scopus 로고
    • A new version of the stream cipher SNOW
    • SAC 2002, Springer
    • Patrik Ekdahl, Thomas Johansson, A new version of the stream cipher SNOW, in SAC 2002, LNCS 2595, Springer, pp. 47-61. Available from http://www.it.lth.se/cryptology/snow/
    • LNCS , vol.2595 , pp. 47-61
    • Ekdahl, P.1    Johansson, T.2
  • 22
    • 24144491738 scopus 로고    scopus 로고
    • A new efficient algorithm for computing Gröbner bases without reduction to zero (F5)
    • Catania, Italy, ACM Press
    • Jean-Charles Faugère: "A new efficient algorithm for computing Gröbner bases without reduction to zero (F5)" Workshop on Applications of Commutative Algebra, Catania, Italy, ACM Press, 2002.
    • (2002) Workshop on Applications of Commutative Algebra
    • Faugère, J.-C.1
  • 23
    • 84958983180 scopus 로고    scopus 로고
    • On the security of nonlinear filter generators
    • FSE'96, Springer
    • Jovan Dj. Colic: On the Security of Nonlinear Filter Generators, FSE'96, LNCS 1039, Springer, pp. 173-188.
    • LNCS , vol.1039 , pp. 173-188
    • Colic, J.Dj.1
  • 24
    • 0242549872 scopus 로고    scopus 로고
    • Correlation properties of a general binary combiner with memory
    • Jovan Dj. Colic: Correlation Properties of a General Binary Combiner with Memory. Journal of Cryptology vol. 9(2), pp. 111-126 (1996).
    • (1996) Journal of Cryptology , vol.9 , Issue.2 , pp. 111-126
    • Colic, J.Dj.1
  • 25
    • 84947279371 scopus 로고    scopus 로고
    • Linear cryptanalysis of Bluetooth stream cipher
    • Eurocrypt 2002, Springer
    • Jovan Dj. Colic, Vittorio Bagini, Guglielmo Morgari: Linear Cryptanalysis of Bluetooth Stream Cipher, Eurocrypt 2002, LNCS 2332, Springer, pp. 238-255.
    • LNCS , vol.2332 , pp. 238-255
    • Colic, J.Dj.1    Bagini, V.2    Morgari, G.3
  • 26
    • 84957694404 scopus 로고    scopus 로고
    • Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree
    • Crypto 98, Springer
    • Thomas Jakobsen: Cryptanalysis of Block Ciphers with Probabilistic Non-Linear Relations of Low Degree, Crypto 98, LNCS 1462, Springer, pp. 212-222, 1998.
    • (1998) LNCS , vol.1462 , pp. 212-222
    • Jakobsen, T.1
  • 27
    • 24944553900 scopus 로고    scopus 로고
    • Guess-and-determine attacks on SNOW
    • SAC 2002, Springer
    • Philip Hawkes, Gregory Rose: Guess-and-determine attacks on SNOW, in SAC 2002, LNCS 2595, Springer, pp. 37-46.
    • LNCS , vol.2595 , pp. 37-46
    • Hawkes, P.1    Rose, G.2
  • 28
    • 35048843339 scopus 로고    scopus 로고
    • Rewriting variables: The complexity of fast algebraic attacks on stream ciphers
    • Crypto 2004, Springer, Available from eprint.iacr.org/2004/081
    • Philip Hawkes, Gregory Rose: Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers, in Crypto 2004, LNCS 3152, pp. 390-406, Springer, 2004. Available from eprint.iacr.org/2004/081/.
    • (2004) LNCS , vol.3152 , pp. 390-406
    • Hawkes, P.1    Rose, G.2
  • 29
    • 0024860262 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • Willi Meier and Othmar Staffelbach: Fast correlation attacks on certain stream ciphers, Journal of Cryptology, 1(3):159-176, 1989.
    • (1989) Journal of Cryptology , vol.1 , Issue.3 , pp. 159-176
    • Meier, W.1    Staffelbach, O.2
  • 30
    • 0026678847 scopus 로고
    • Correlation properties of combiners with memory in stream ciphers
    • Willi Meier and Othmar Staffelbach: Correlation Properties of Combiners with Memory in Stream Ciphers, Journal of Cryptology 5(1): pp. 67-86 (1992).
    • (1992) Journal of Cryptology , vol.5 , Issue.1 , pp. 67-86
    • Meier, W.1    Staffelbach, O.2
  • 33
    • 84957640013 scopus 로고
    • Cryptanalysis of the matsumoto and imai public key scheme of Eurocrypt'88
    • Crypto'95, Springer
    • Jacques Patarin: Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88, Crypto'95, Springer, LNCS 963, pp. 248-261, 1995.
    • (1995) LNCS , vol.963 , pp. 248-261
    • Patarin, J.1
  • 34
    • 0242571729 scopus 로고    scopus 로고
    • Turing: A fast stream cipher
    • FSE 2003, Springer
    • Gregory G. Rose and Philip Hawkes: Turing: a Fast Stream Cipher, FSE 2003, LNCS, Springer.
    • LNCS
    • Rose, G.G.1    Hawkes, P.2
  • 35
    • 77649327985 scopus 로고    scopus 로고
    • Efficient algorithms for solving overdefined systems of multivariate polynomial equations
    • Eurocrypt'2000, Springer
    • Adi Shamir, Jacques Patarin, Nicolas Courtois, Alexander Klimov, Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations, Eurocrypt'2000, LNCS 1807, Springer, pp. 392-407.
    • LNCS , vol.1807 , pp. 392-407
    • Shamir, A.1    Patarin, J.2    Courtois, N.3    Klimov, A.4
  • 36
    • 84949212529 scopus 로고    scopus 로고
    • LILI keystream generator
    • SAC'2000, Springer
    • L. Simpson, E. Dawson, J. Golic and W. Millan: LILI Keystream Generator, SAC'2000, LNCS 2012, Springer, pp. 248-261,
    • LNCS , vol.2012 , pp. 248-261
    • Simpson, L.1    Dawson, E.2    Golic, J.3    Millan, W.4
  • 37
    • 34250487811 scopus 로고
    • Gaussian elimination is not optimal
    • Volker Strassen: Gaussian Elimination is Not Optimal, Numerische Mathematik, vol 13, pp 354-356, 1969.
    • (1969) Numerische Mathematik , vol.13 , pp. 354-356
    • Strassen, V.1
  • 38
    • 84983158418 scopus 로고    scopus 로고
    • Maximum correlation analysis of nonlinear S-boxes in stream ciphers
    • Crypto 2000, Springer
    • Muxiang Zhang, Agnes Chan: Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers. In Crypto 2000, LNCS 1880, pp. 501-514, Springer 2000.
    • (2000) LNCS , vol.1880 , pp. 501-514
    • Zhang, M.1    Chan, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.