-
1
-
-
84948981360
-
Searching for the Optimum Correlation Attack
-
FSE'94, Springer
-
Ross Anderson: Searching for the Optimum Correlation Attack, FSE'94, LNCS 1008, Springer, pp. 137-143, 1994.
-
(1994)
LNCS
, vol.1008
, pp. 137-143
-
-
Anderson, R.1
-
3
-
-
33745835817
-
-
Nessie project internal report, 22 January
-
Steve Babbage: Cryptanalysis of LILI-128, Nessie project internal report, available at https://www.cosic.esat.kuleuven.ac.be/nessie/reports/, 22 January 2001.
-
(2001)
Cryptanalysis of LILI-128
-
-
Babbage, S.1
-
4
-
-
84947914301
-
A Fast New des Implementation in Software
-
FSE'97, Springer
-
Eli Biham: A Fast New DES Implementation in Software, FSE'97, Springer, LNCS 1267, pp. 260-272, 1997.
-
(1997)
LNCS
, vol.1267
, pp. 260-272
-
-
Biham, E.1
-
5
-
-
85002229923
-
On Correlation-immune Functions
-
Crypto'91, Springer
-
Paul Camion, Claude Carlet, Pascale Charpin and Nicolas Sendrier: On Correlation-immune Functions, In Crypto'91, LNCS 576, Springer, pp. 86-100, 1992.
-
(1992)
LNCS
, vol.576
, pp. 86-100
-
-
Camion, P.1
Carlet, C.2
Charpin, P.3
Sendrier, N.4
-
6
-
-
85023205150
-
Matrix multiplication via arithmetic progressions
-
1990, March
-
Don Coppersmith, Shmuel Winograd: Matrix multiplication via arithmetic progressions, J. Symbolic Computation (1990), 9, pp. 251-280, March 1990.
-
(1990)
J. Symbolic Computation
, vol.9
, pp. 251-280
-
-
Coppersmith, D.1
Winograd, S.2
-
7
-
-
84937560136
-
The security of Hidden Field Equations (HFE)
-
Cryptographers' Track Rsa Conference 2001, San Francisco 8-12 April 2001, Springer
-
Nicolas Courtois: The security of Hidden Field Equations (HFE), Cryptographers' Track Rsa Conference 2001, San Francisco 8-12 April 2001, LNCS2020, Springer, pp. 266-281, 2001.
-
(2001)
LNCS
, vol.2020
, pp. 266-281
-
-
Courtois, N.1
-
8
-
-
35248834096
-
About the XL Algorithm over GF(2)
-
Cryptographers' Track RSA 2003, San Francisco, April 13-17 Springer
-
Nicolas Courtois and Jacques Patarin: About the XL Algorithm over GF(2), Cryptographers' Track RSA 2003, San Francisco, April 13-17 2003, LNCS, Springer.
-
(2003)
LNCS
-
-
Courtois, N.1
Patarin, J.2
-
9
-
-
84958765510
-
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
-
Asiacrypt 2002, Springer, A preprint with a different version of the attack is available at
-
Nicolas Courtois and Josef Pieprzyk: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations, Asiacrypt 2002, LNCS 2501, Springer, 2002. A preprint with a different version of the attack is available at http://eprint.iacr.org/2002/044/.
-
(2002)
LNCS
, vol.2501
-
-
Courtois, N.1
Pieprzyk, J.2
-
10
-
-
35248828626
-
Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt
-
ICISC 2002, November 2002, Seoul, Korea, Springer, An updated version is available at
-
Nicolas Courtois: Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt, ICISC 2002, November 2002, Seoul, Korea, LNCS 2587, Springer, 2002. An updated version is available at http://eprint.iacr.org/2002/087/.
-
(2002)
LNCS
, vol.2587
-
-
Courtois, N.1
-
12
-
-
23044522041
-
Decimation Attack of Stream Ciphers
-
Indocrypt 2000
-
Eric Filiol: Decimation Attack of Stream Ciphers, Indocrypt 2000, LNCS 1977, pp. 31-42, 2000. Available on eprint.iacr.org/2000/040.
-
(2000)
LNCS
, vol.1977
, pp. 31-42
-
-
Filiol, E.1
-
13
-
-
84958983180
-
On the Security of Nonlinear Filter Generators
-
FSE'96, Springer
-
Jovan Dj. Golic: On the Security of Nonlinear Filter Generators, FSE'96, LNCS 1039, Springer, pp. 173-188.
-
LNCS
, vol.1039
, pp. 173-188
-
-
Golic, J.Dj.1
-
14
-
-
84947905024
-
Fast low order approximation of cryptographic functions
-
Eurocrypt'96, Springer
-
Jovan Dj. Golic: Fast low order approximation of cryptographic functions, Eurocrypt'96, LNCS 1070, Springer, pp. 268-282, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 268-282
-
-
Golic, J.Dj.1
-
15
-
-
0024860262
-
Fast correlation attacks on certain stream ciphers
-
Willi Meier and Othmar Staffelbach: Fast correlation attacks on certain stream ciphers, Journal of Cryptology, 1(3):159-176, 1989.
-
(1989)
Journal of Cryptology
, vol.1
, Issue.3
, pp. 159-176
-
-
Meier, W.1
Staffelbach, O.2
-
16
-
-
84962928435
-
Nonlinearity Criteria for Cryptographic Functions
-
Eurocrypt'89, Springer
-
Willi Meier and Othmar Staffelbach: Nonlinearity Criteria for Cryptographic Functions, Eurocrypt'89, LNCS 434, Springer, pp. 549-562, 1990.
-
(1990)
LNCS
, vol.434
, pp. 549-562
-
-
Meier, W.1
Staffelbach, O.2
-
18
-
-
0036458332
-
Cryptanalysis of Toyocrypt-HS1 stream cipher
-
Jan.
-
M. Mihaljevic, H. Imai: Cryptanalysis of Toyocrypt-HS1 stream cipher, IEICE Transactions on Fundamentals, vol. E85-A, pp. 66-73, Jan. 2002. Available at http://www.csl.sony.co.jp/ATL/papers/IEICEjan02.pdf.
-
(2002)
IEICE Transactions on Fundamentals
, vol.E85-A
, pp. 66-73
-
-
Mihaljevic, M.1
Imai, H.2
-
20
-
-
84969396978
-
Nonlinearity Bounds and Constructions of Resilient Boolean Functions
-
Crypto 2000, Springer
-
Palash Sarkar, Subhamoy Maitra: Nonlinearity Bounds and Constructions of Resilient Boolean Functions, In Crypto 2000, LNCS 1880, Springer, pp. 515-532, 2000.
-
(2000)
LNCS
, vol.1880
, pp. 515-532
-
-
Sarkar, P.1
Maitra, S.2
-
21
-
-
77649327985
-
Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations
-
Eurocrypt'2000, Springer
-
Adi Shamir, Jacques Patarin, Nicolas Courtois and Alexander Klimov: Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations, Eurocrypt'2000, LNCS 1807, Springer, pp. 392-407, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 392-407
-
-
Shamir, A.1
Patarin, J.2
Courtois, N.3
Klimov, A.4
-
22
-
-
84949212529
-
LILI Keystream Generator
-
SAC'2000, Springer
-
L. Simpson, E. Dawson, J. Golic and W. Millan: LILI Keystream Generator, SAC'2000, LNCS 2012, Springer, pp. 248-261, 2000. Available at www.isrc.qut.edu.au/lili/.
-
(2000)
LNCS
, vol.2012
, pp. 248-261
-
-
Simpson, L.1
Dawson, E.2
Golic, J.3
Millan, W.4
-
23
-
-
84949427555
-
A Time-Memory Tradeoff Attack Against LILI-128
-
FSE 2002, Springer
-
Markku-Juhani Olavi Saarinen: A Time-Memory Tradeoff Attack Against LILI-128, FSE 2002, LNCS 2365, Springer, pp. 231-236, 2002. Available at http://eprint.iacr.org/2001/077/.
-
(2002)
LNCS
, vol.2365
, pp. 231-236
-
-
Saarinen, M.-J.O.1
-
24
-
-
84890522850
-
Communication theory of secrecy systems
-
see in patricular
-
Claude Elwood Shannon: Communication theory of secrecy systems, Bell System Technical Journal 28 (1949), see in patricular page 704.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 704
-
-
Shannon, C.E.1
-
25
-
-
34250487811
-
Gaussian Elimination is Not Optimal
-
Volker Strassen: Gaussian Elimination is Not Optimal, Numerische Mathematik, vol 13, pp. 354-356, 1969.
-
(1969)
Numerische Mathematik
, vol.13
, pp. 354-356
-
-
Strassen, V.1
|