-
2
-
-
24144437725
-
Extending the resynchronization attack
-
Helena Handschuh and Anwar Kasan, editors, number 3357 in Lecture Notes in Computer Science, Springer-Verlag
-
Frederik Armknecht, Joseph Lano, and Bart Preneel. Extending the resynchronization attack. In Helena Handschuh and Anwar Kasan, editors, Selected Areas in Cryptography, SAC 2004, number 3357 in Lecture Notes in Computer Science, pages 19-38. Springer-Verlag, 2004.
-
(2004)
Selected Areas in Cryptography, SAC 2004
, pp. 19-38
-
-
Armknecht, F.1
Lano, J.2
Preneel, B.3
-
4
-
-
33744755483
-
On the algebraic immunity of symmetric boolean functions
-
K.U. Leuven
-
An Braeken. On the algebraic immunity of symmetric boolean functions. Technical report, K.U. Leuven, 2005.
-
(2005)
Technical Report
-
-
Braeken, A.1
-
5
-
-
33745618450
-
On the (im)possibility of practical and secure nonlinear filters and combiners (extended version)
-
An Braeken and Joseph Lano. On the (im)possibility of practical and secure nonlinear filters and combiners (extended version). COSIC technical report, 2005. https://www.cosic.esat.kuleuven.be/publications/.
-
(2005)
COSIC Technical Report
-
-
Braeken, A.1
Lano, J.2
-
6
-
-
84948963512
-
Improved fast correlation attacks using parity-check equations of weight 4 and 5
-
B. Preneel, editor, number 1807 in Lecture Notes in Computer Science. Springer-Verlag
-
Anne Canteaut and Michael Trabbia. Improved fast correlation attacks using parity-check equations of weight 4 and 5. In B. Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, number 1807 in Lecture Notes in Computer Science, pages 573-588. Springer-Verlag, 2000.
-
(2000)
Advances in Cryptology - EUROCRYPT 2000
, pp. 573-588
-
-
Canteaut, A.1
Trabbia, M.2
-
9
-
-
35248849880
-
Fast algebraic attacks on stream ciphers with linear feedback
-
D. Boneh, editor, number 2729 in Lecture Notes in Computer Science, Springer-Verlag
-
Nicolas Courtois. Fast algebraic attacks on stream ciphers with linear feedback. In D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, number 2729 in Lecture Notes in Computer Science, pages 176-194. Springer-Verlag, 2003.
-
(2003)
Advances in Cryptology - CRYPTO 2003
, pp. 176-194
-
-
Courtois, N.1
-
11
-
-
35248820612
-
Algebraic attacks on stream ciphers with linear feedback
-
E. Biham, editor, number 2656 in Lecture Notes in Computer Science, Springer-Verlag, extended version on eprint
-
Nicolas Courtois and Willi Meier. Algebraic attacks on stream ciphers with linear feedback. In E. Biham, editor, Advances in Cryptology - EUROCRYPT 2003, number 2656 in Lecture Notes in Computer Science, pages 345-359. Springer-Verlag, 2003. extended version on eprint.
-
(2003)
Advances in Cryptology - EUROCRYPT 2003
, pp. 345-359
-
-
Courtois, N.1
Meier, W.2
-
12
-
-
85028746172
-
Resynchronization weaknesses in synchronous stream ciphers
-
T. Helleseth, editor, number 765 in Lecture Notes in Computer Science, Springer-Verlag
-
Joan Daemen, Rene Govaerts, and Joos Vandewalle. Resynchronization weaknesses in synchronous stream ciphers. In T. Helleseth, editor, Advances in Cryptology -EUROCRYPT 1993, number 765 in Lecture Notes in Computer Science, pages 159-167. Springer-Verlag, 1993.
-
(1993)
Advances in Cryptology -EUROCRYPT 1993
, pp. 159-167
-
-
Daemen, J.1
Govaerts, R.2
Vandewalle, J.3
-
13
-
-
26444607970
-
Cryptographically significant Boolean functions: Construction and analysis in terms of algebraic immunity
-
H. Gilbert and H. Handschuh, editors, Lecture Notes in Computer Science. Springer-Verlag
-
Deepak Dalai, Kishan Gupta, and Subhamoy Maitra. Cryptographically significant Boolean functions: Construction and analysis in terms of algebraic immunity. In H. Gilbert and H. Handschuh, editors, Fast Software Encryption, FSE 2005, Lecture Notes in Computer Science. Springer-Verlag, 2005.
-
(2005)
Fast Software Encryption, FSE 2005
-
-
Dalai, D.1
Gupta, K.2
Maitra, S.3
-
16
-
-
0035335583
-
Ternary m-sequences with three-valued crosscorrelation: New decimations of Welch and Niho type
-
November
-
Hans Dobbertin, Thor Helleseth, Vijay Kumar, and Halvard Martinsen. Ternary m-sequences with three-valued crosscorrelation: New decimations of Welch and Niho type. IEEE Transactions on Information Theory, IT-47-.1473-1481, November 2001.
-
(2001)
IEEE Transactions on Information Theory
, vol.IT-47
, pp. 1473-1481
-
-
Dobbertin, H.1
Helleseth, T.2
Kumar, V.3
Martinsen, H.4
-
17
-
-
24144456208
-
A new simple technique to attack filter generators and related ciphers
-
Helena Handschuh and Anwar Hasan, editors, number 3357 in LNCS, Springer
-
Hakan Englund and Thomas Johansson. A new simple technique to attack filter generators and related ciphers. In Helena Handschuh and Anwar Hasan, editors, Selected Areas in Cryptography, SAC 2004, number 3357 in LNCS, pages 39-53. Springer, 2004.
-
(2004)
Selected Areas in Cryptography, SAC 2004
, pp. 39-53
-
-
Englund, H.1
Johansson, T.2
-
19
-
-
0030261891
-
Computation of low-weight parity-check polynomials
-
Jovan Golic. Computation of low-weight parity-check polynomials. Electronics Letters, 32(21): 1981-1982, 1996.
-
(1996)
Electronics Letters
, vol.32
, Issue.21
, pp. 1981-1982
-
-
Golic, J.1
-
20
-
-
35048843339
-
Rewriting variables: The complexity of fast algebraic attacks on stream ciphers
-
Matthew Franklin, editor, number 3152 in Lecture Notes in Computer Science, Springer-Verlag
-
Philip Hawkes and Gregory Rose. Rewriting variables: The complexity of fast algebraic attacks on stream ciphers. In Matthew Franklin, editor, Advances in Cryptology - CRYPTO 2004, number 3152 in Lecture Notes in Computer Science, pages 390-406. Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology - CRYPTO 2004
, pp. 390-406
-
-
Hawkes, P.1
Rose, G.2
-
21
-
-
0001059304
-
The weight enumerators for several classes of subcodes of the second order binary Reed-Muller codes
-
Tadao Kasami. The weight enumerators for several classes of subcodes of the second order binary Reed-Muller codes. Information and Control, 18:369-394, 1971.
-
(1971)
Information and Control
, vol.18
, pp. 369-394
-
-
Kasami, T.1
-
22
-
-
0017017134
-
An analysis of the structure and complexity of nonlinear binary sequence generators
-
Edwin Key. An analysis of the structure and complexity of nonlinear binary sequence generators. IEEE Transactions on Information Theory, 22:732-736, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, pp. 732-736
-
-
Key, E.1
-
23
-
-
33745624845
-
-
Computational method and apparatus for finite field arithmetic. US Patent No. 4, 587,627
-
James Massey and Jimmy Omura. Computational method and apparatus for finite field arithmetic. US Patent No. 4, 587,627, 1986.
-
(1986)
-
-
Massey, J.1
Omura, J.2
-
24
-
-
35048845264
-
Algebraic attacks and decomposition of boolean functions
-
C. Cachin and J. Camenisch, editors, number 3027 in Lecture Notes in Computer Science, Springer-Verlag
-
Willi Meier, Enes Pasalic, and Claude Carlet. Algebraic attacks and decomposition of boolean functions. In C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, number 3027 in Lecture Notes in Computer Science, pages 474-491. Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology - EUROCRYPT 2004
, pp. 474-491
-
-
Meier, W.1
Pasalic, E.2
Carlet, C.3
-
25
-
-
26444613218
-
An improved correlation attack against irregular clocked and filtered keystream generators
-
Matthew Franklin, editor, number 3152 in Lecture Notes in Computer Science, Springer-Verlag
-
Havard Molland and Thor Helleseth. An improved correlation attack against irregular clocked and filtered keystream generators. In Matthew Franklin, editor, Advances in Cryptology - CRYPTO 2004, number 3152 in Lecture Notes in Computer Science, pages 373-389. Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology - CRYPTO 2004
, pp. 373-389
-
-
Molland, H.1
Helleseth, T.2
-
27
-
-
84956974817
-
Efficient software implementation for finite field multiplication in normal basis
-
Sihan Qing, Tatsuaki Okamoto, and Jianying Zhou, editors, number 2229 in Lecture Notes in Computer Science, Springer-Verlag
-
Peng Ning and Yiqun Lisa Yin. Efficient software implementation for finite field multiplication in normal basis. In Sihan Qing, Tatsuaki Okamoto, and Jianying Zhou, editors, Third International Conference on Information and Communications Security ICICS 2001, number 2229 in Lecture Notes in Computer Science, pages 177-188. Springer-Verlag, 2001.
-
(2001)
Third International Conference on Information and Communications Security ICICS 2001
, pp. 177-188
-
-
Ning, P.1
Yin, Y.L.2
-
28
-
-
84962968104
-
Differentially uniform mappings for cryptography
-
T. Helleseth, editor, Eurocrypt 1993, Springer-Verlag
-
Kaisa Nyberg. Differentially uniform mappings for cryptography. In T. Helleseth, editor, Eurocrypt 1993, volume 950 of Lecture Notes in Computer Science, pages 55-64. Springer-Verlag, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.950
, pp. 55-64
-
-
Nyberg, K.1
-
29
-
-
84968517739
-
On a special class of polynomials
-
Oystein Ore. On a special class of polynomials. Trans. Amer. Math.Soc., 35:559-584, 1933.
-
(1933)
Trans. Amer. Math.Soc.
, vol.35
, pp. 559-584
-
-
Ore, O.1
-
31
-
-
0242493840
-
Fast normal basis multiplication using general purpose processors
-
Arash Reyhani-Masoleh and Anwar Hasan. Fast normal basis multiplication using general purpose processors. IEEE Transaction on Computers, 52(3): 1379-1390, 2003.
-
(2003)
IEEE Transaction on Computers
, vol.52
, Issue.3
, pp. 1379-1390
-
-
Reyhani-Masoleh, A.1
Hasan, A.2
-
32
-
-
35048849354
-
On the applicability of distinguishing attacks against stream ciphers
-
Greg Rose and Philip Hawkes. On the applicability of distinguishing attacks against stream ciphers. In Proceedings of the 3rd NESSIE Workshop, page 6, 2002.
-
(2002)
Proceedings of the 3rd NESSIE Workshop
, pp. 6
-
-
Rose, G.1
Hawkes, P.2
-
34
-
-
0021489155
-
Correlation-immunity of nonlinear combining functions for cryptographic applications
-
Thomas Siegenthaler. Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Transactions on Information Theory, IT-30(5):776-780, 1984.
-
(1984)
IEEE Transactions on Information Theory
, vol.IT-30
, Issue.5
, pp. 776-780
-
-
Siegenthaler, T.1
-
35
-
-
34250487811
-
Gaussian elimination is not optimal
-
Volker Strassen. Gaussian elimination is not optimal. Numerische Mathematik, 13:354-356, 1969.
-
(1969)
Numerische Mathematik
, vol.13
, pp. 354-356
-
-
Strassen, V.1
|