-
1
-
-
35048861887
-
Improving fast algebraic attacks
-
FSE 2004, Springer Verlag
-
F. Armknecht. Improving Fast Algebraic Attacks. FSE 2004, number 3017 in Lecture Notes in Computer Science, pp. 65-82. Springer Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3017
, pp. 65-82
-
-
Armknecht, F.1
-
2
-
-
33746033761
-
Efficient computation of algebraic immunity for algebraic and fast algebraic attacks
-
Advances in Cryptology, EUROCRYPT 2006
-
F. Armknecht, G. Carlet, P. Gaborit, S. Knzli, W. Meier and O. Ruatta. Efficient computation of algebraic immunity for algebraic and fast algebraic attacks. Advances in Cryptology, EUROCRYPT 2006, Lecture Notes in Computer Science 4004, pp. 147-164, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4004
, pp. 147-164
-
-
Armknecht, F.1
Carlet, G.2
Gaborit, P.3
Knzli, S.4
Meier, W.5
Ruatta, O.6
-
3
-
-
33646836818
-
On the algebraic immunity of symmetric boolean functions
-
Indocrypt 2005
-
A. Braeken and B. Preneel. On the Algebraic Immunity of Symmetric Boolean Functions. Indocrypt 2005, LNCS 3797, pp. 35-48, 2005.
-
(2005)
LNCS
, vol.3797
, pp. 35-48
-
-
Braeken, A.1
Preneel, B.2
-
4
-
-
51649103770
-
-
Some false results of this reference have been corrected in Bracken's PhD thesis entitled
-
Some false results of this reference have been corrected in Bracken's PhD thesis entitled "Cryptographic properties of Boolean functions and S-boxes" and available at URL http://homes.esat.kuleuven.be/abraeken/ thesisAn.pdf.
-
Cryptographic Properties of Boolean Functions and S-boxes
-
-
-
5
-
-
33749540808
-
Open problems related to algebraic attacks on stream ciphers
-
A. Canteaut. Open problems related to algebraic attacks on stream ciphers. Proceedings of WCC 2005, pp. 1-10, 2005.
-
(2005)
Proceedings of WCC 2005
, pp. 1-10
-
-
Canteaut, A.1
-
6
-
-
84948963512
-
Improved fast correlation attacks using parity-check equations of weight 4 and 5
-
EUROCRYPT 2000, Springer Verlag
-
A. Canteaut and M. Trabbia. Improved fast correlation attacks using parity-check equations of weight 4 and 5. EUROCRYPT 2000, number 1807 in Lecture Notes in Computer Science, pp. 573-588. Springer Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 573-588
-
-
Canteaut, A.1
Trabbia, M.2
-
7
-
-
33745667321
-
On bent and highly nonlinear balanced/resilient functions and their algebraic immunities
-
Proceedings of AAECC 16
-
C. Carlet. On bent and highly nonlinear balanced/resilient functions and their algebraic immunities. Proceedings of AAECC 16, LNCS 3857, pp. 1-28, 2006.
-
(2006)
LNCS
, vol.3857
, pp. 1-28
-
-
Carlet, C.1
-
8
-
-
48849097795
-
Boolean functions for cryptography and error correcting codes
-
Chapter of the monography Y. Crama and P. Hammer eds, Cambridge University Press, to appear in 2006.
-
C. Carlet. Boolean Functions for Cryptography and Error Correcting Codes. Chapter of the monography Boolean Methods and Models, Y. Crama and P. Hammer eds, Cambridge University Press, to appear in 2006. Preliminary version available at http://www-rocq.inria.fr/codes/Claude.Carlet/pubs.html
-
Boolean Methods and Models
-
-
Carlet, C.1
-
9
-
-
33746350122
-
Algebraic immunity for crypto graphically significant boolean functions: Analysis and construction
-
To appear in, July
-
C. Carlet, D. Dalai, K. Gupta and S. Maitra. Algebraic Immunity for Crypto graphically Significant Boolean Functions: Analysis and Construction. To appear in IEEE Transactions on Information Theory, vol. 52, no. 7, July 2006.
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.7
-
-
Carlet, C.1
Dalai, D.2
Gupta, K.3
Maitra, S.4
-
13
-
-
84941165101
-
Improving the upper bounds on the covering radii of binary
-
C. Carlet et S. Mesnager. To appear in
-
C. Carlet and S. Mesnager. Improving the upper bounds on the covering radii of binary Reed-Muller codes. C. Carlet et S. Mesnager. To appear in IEEE Transactions on Information Theory, 2006.
-
IEEE Transactions on Information Theory
-
-
Carlet, C.1
Mesnager, S.2
-
14
-
-
84948990962
-
Links between differential and linear cryptanalysis
-
EUROCRYPT'94, Advances in Cryptology, Springer Verlag
-
F. Chabaud and S. Vaudenay. Links between Differential and Linear Cryptanalysis. EUROCRYPT'94, Advances in Cryptology, Lecture Notes in Computer Science 950, Springer Verlag, pp. 356-365, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.950
, pp. 356-365
-
-
Chabaud, F.1
Vaudenay, S.2
-
16
-
-
35248828626
-
Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt
-
Proceedings of ICISC 2002
-
N. Courtois. Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt. Proceedings of ICISC 2002, LNCS 2587, pp. 182-199.
-
LNCS
, vol.2587
, pp. 182-199
-
-
Courtois, N.1
-
17
-
-
35248820612
-
Algebraic attacks on stream ciphers with linear feed-back
-
Advances in Cryptology - EUROCRYPT 2003, Springer Verlag
-
N. Courtois and W. Meier. Algebraic attacks on stream ciphers with linear feed-back. Advances in Cryptology - EUROCRYPT 2003, number 2656 in Lecture Notes in Computer Science, pp. 345-359. Springer Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 345-359
-
-
Courtois, N.1
Meier, W.2
-
18
-
-
35248849880
-
Fast algebraic attacks on stream ciphers with linear feedback
-
CRYPTO 2003, Springer Verlag
-
N. Courtois. Fast algebraic attacks on stream ciphers with linear feedback. CRYPTO 2003, number 2729 in Lecture Notes in Computer Science, pp. 176-194. Springer Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 176-194
-
-
Courtois, N.1
-
19
-
-
35048830936
-
Results on algebraic immunity for cryptographically significant boolean functions
-
Indocrypt 2004, Chennai, India, December 20-22, Springer Verlag
-
D. K. Dalai, K. C. Gupta and S. Maitra. Results on Algebraic Immunity for Cryptographically Significant Boolean Functions. Indocrypt 2004, Chennai, India, December 20-22, pp. 92-106, number 3348 in Lecture Notes in Computer Science, Springer Verlag, 2004
-
(2004)
Lecture Notes in Computer Science
, vol.3348
, pp. 92-106
-
-
Dalai, D.K.1
Gupta, K.C.2
Maitra, S.3
-
20
-
-
26444607970
-
Cryptographically significant boolean functions: Construction and analysis in terms of algebraic immunity
-
Workshop on Fast Software Encryption, FSE 2005, Springer-Verlag
-
D. K. Dalai, K. C. Gupta and S. Maitra. Cryptographically Significant Boolean functions: Construction and Analysis in terms of Algebraic Immunity. Workshop on Fast Software Encryption, FSE 2005, pages 98-111, number 3557, Lecture Notes in Computer Science, Springer-Verlag.
-
Lecture Notes in Computer Science
, vol.3557
, pp. 98-111
-
-
Dalai, D.K.1
Gupta, K.C.2
Maitra, S.3
-
21
-
-
84941160250
-
-
Cryptology ePrint Archive, 15 July
-
D. K. Dalai, S. Maitra and S. Sarkar. Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity. Cryptology ePrint Archive, http://eprint.iacr.org/, No. 2005/229, 15 July, 2005.
-
(2005)
Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity
, vol.2005
, Issue.229
-
-
Dalai, D.K.1
Maitra, S.2
Sarkar, S.3
-
26
-
-
84929185964
-
A fast correlation attack on nonlinearly feedforward filtered shift register sequences
-
EUROCRYPT '89, Springer
-
R. Forré. A fast correlation attack on nonlinearly feedforward filtered shift register sequences. EUROCRYPT '89, Lecture Notes in Comput. Sci. 434, pp. 586-595, Springer, 1990.
-
(1990)
Lecture Notes in Comput. Sci.
, vol.434
, pp. 586-595
-
-
Forré, R.1
-
27
-
-
84947905024
-
Fast low order approximation of cryptographic functions
-
Proceedings of EUROCRYPT'96
-
J. Golic. Fast low order approximation of cryptographic functions. Proceedings of EUROCRYPT'96, LNCS 1070, pp. 268-282, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 268-282
-
-
Golic, J.1
-
28
-
-
35048843339
-
Rewriting variables: The complexity of fast algebraic attacks on stream ciphers
-
CRYPTO 2004, Springer Verlag
-
P. Hawkes and G. G. Rose. Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers. CRYPTO 2004, LNCS 3152, pp. 390-406. Springer Verlag, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 390-406
-
-
Hawkes, P.1
Rose, G.G.2
-
29
-
-
84956860766
-
Probabilistic higher order differential attack and higher order bent functions
-
Proceedings of ASIACRYPT'99
-
T. Iwata and K. Kurosawa. Probabilistic higher order differential attack and higher order bent functions. Proceedings of ASIACRYPT'99, LNCS 1716, pp. 62-74, 1999.
-
(1999)
LNCS
, vol.1716
, pp. 62-74
-
-
Iwata, T.1
Kurosawa, K.2
-
30
-
-
84948949623
-
Truncated and higher order differentials
-
Fast Software Encryption, Second International Workshop, Springer-Verlag
-
L.R. Knudsen. Truncated and higher order differentials. Fast Software Encryption, Second International Workshop, Lecture Notes in Computer Science, n 1008. pp. 196-211. - Springer-Verlag, 1995.
-
(1995)
Lecture Notes in Computer Science
, Issue.1008
, pp. 196-211
-
-
Knudsen, L.R.1
-
31
-
-
84947931044
-
Non-linear approximations in linear crypt-analysis
-
Proceedings of EUROCRYPT'96
-
L.R. Knudsen and M. J. B. Robshaw. Non-linear approximations in linear crypt-analysis. Proceedings of EUROCRYPT'96, LNCS 1070, pp. 224-236, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 224-236
-
-
Knudsen, L.R.1
Robshaw, M.J.B.2
-
32
-
-
0041863249
-
Higher order derivatives and differential cryptanalysis
-
honor of J. L. Massey on the occasion of his 60'th birthday.
-
X. Lai. Higher order derivatives and differential cryptanalysis. Proc. "Symposium on Communication, Coding and Cryptography", in honor of J. L. Massey on the occasion of his 60'th birthday. 1994.
-
(1994)
Proc. "Symposium on Communication, Coding and Cryptography"
-
-
Lai, X.1
-
33
-
-
0012575273
-
Almost k-wise independent sample spaces and their applications
-
K. Kurosawa, T. Johansson and D. Stinson. Almost k-wise independent sample spaces and their applications. J. of Cryptology, vol. 14, no. 4, pp. 231-253, 2001.
-
(2001)
J. of Cryptology
, vol.14
, Issue.4
, pp. 231-253
-
-
Kurosawa, K.1
Johansson, T.2
Stinson, D.3
-
35
-
-
84937740421
-
Shift-register synthesis and BCH decoding
-
J.L. Massey. Shift-register synthesis and BCH decoding. IEEE Transactions on Information Theory, vol. 15, pp. 122-127, 1969.
-
(1969)
IEEE Transactions on Information Theory
, vol.15
, pp. 122-127
-
-
Massey, J.L.1
-
36
-
-
85025704284
-
Linear cryptanalysis method for des cipher
-
Advances in Cryptology - EUROCRYPT'93, Springer-Verlag
-
M. Matsui. Linear cryptanalysis method for DES cipher. Advances in Cryptology - EUROCRYPT'93, number 765 in Lecture Notes in Computer Science. Springer-Verlag, pp. 386-397, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
37
-
-
85030476632
-
New approaches to the design of self-synchronizing stream ciphers
-
Proceedings of EUROCRYPT'91.
-
U. M. Maurer. New approaches to the design of self-synchronizing stream ciphers. Proceedings of EUROCRYPT'91. LNCS 547, pp. 458-471, 1991.
-
(1991)
LNCS
, vol.547
, pp. 458-471
-
-
Maurer, U.M.1
-
39
-
-
84955573259
-
Low order approximation of cipher functions
-
Cryptographic Policy and Algorithms.
-
W. Millan. Low order approximation of cipher functions. Cryptographic Policy and Algorithms. LNCS 1029, pp. 144-155, 1996.
-
(1996)
LNCS
, vol.1029
, pp. 144-155
-
-
Millan, W.1
-
41
-
-
35048845264
-
Algebraic attacks and decomposition of Boolean functions
-
EUROCRYPT 2004, Springer Verlag
-
W. Meier, E. Pasalic and C. Carlet. Algebraic attacks and decomposition of Boolean functions. EUROCRYPT 2004, number 3027 in Lecture Notes in Computer Science, pp. 474-491. Springer Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 474-491
-
-
Meier, W.1
Pasalic, E.2
Carlet, C.3
-
42
-
-
84962928435
-
Nonlinearity criteria for cryptographic functions
-
EUROCRYPT' 89, Springer Verlag
-
W. Meier and O. Staffelbach. Nonlinearity Criteria for Cryptographic Functions. EUROCRYPT' 89, Lecture Notes in Computer Science 434, Springer Verlag, pp. 549-562, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.434
, pp. 549-562
-
-
Meier, W.1
Staffelbach, O.2
-
43
-
-
0003819410
-
Analysis and design of stream ciphers
-
Berlin, Heidelberg, NY, London, Paris, Tokyo
-
R. A. Rueppel Analysis and design of stream ciphers Com. and Contr. Eng. Series, Berlin, Heidelberg, NY, London, Paris, Tokyo, 1986
-
(1986)
Com. and Contr. Eng. Series
-
-
Rueppel, R.A.1
-
44
-
-
84890522850
-
Communication theory of secrecy systems
-
C.E. Shannon. Communication theory of secrecy systems. Bell system technical journal, 28, pp. 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
|