-
2
-
-
35248840147
-
Algebraic Atacks on Combiners with Memory
-
these proceedings, Crypto 2003, Springer
-
Frederik Armknecht, Matthias Krause: Algebraic Atacks on Combiners with Memory, in these proceedings, Crypto 2003, LNCS 2729, Springer, 2003.
-
(2003)
LNCS
, vol.2729
-
-
Armknecht, F.1
Krause, M.2
-
3
-
-
84948981360
-
Searching for the Optimum Correlation Attack
-
FSE'94, Springer
-
Ross Anderson: Searching for the Optimum Correlation Attack, FSE'94, LNCS 1008, pp 137-143, Springer. 1994.
-
(1994)
LNCS
, vol.1008
, pp. 137-143
-
-
Anderson, R.1
-
4
-
-
33745835817
-
Cryptanalysis of LILI-128
-
22 January
-
Steve Babbage: Cryptanalysis of LILI-128, Nessie project internal report, https://www.cosic.esat.kuleuven.ac.be/nessie/reports/, 22 January 2001.
-
(2001)
Nessie Project Internal Report
-
-
Babbage, S.1
-
7
-
-
84983014125
-
Fast solution of Toeplitz systems of equations and computation of Padé approximants
-
R. P. Brent, F. G. Gustavson, D. Y. Y. Yun: Fast solution of Toeplitz systems of equations and computation of Padé approximants. J. Algorithms, 1:259-295, 1980.
-
(1980)
J. Algorithms
, vol.1
, pp. 259-295
-
-
Brent, R.P.1
Gustavson, F.G.2
Yun, D.Y.Y.3
-
9
-
-
85002229923
-
On Correlation-immune Functions
-
Crypto'91, Springer
-
Paul Camion, Claude Carlet, Pascale Charpin and Nicolas Sendrier, On Correlation-immune Functions, Crypto'91, LNCS 576, pp. 86-100, Springer, 1991.
-
(1991)
LNCS
, vol.576
, pp. 86-100
-
-
Camion, P.1
Carlet, C.2
Charpin, P.3
Sendrier, N.4
-
10
-
-
35248828626
-
Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt
-
ICISC 2002, Springer. An updated version
-
Nicolas Courtois: Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt, ICISC 2002, LNCS 2587, Springer. An updated version (2002) is available at http://eprint.iacr.org/2002/087/.
-
(2002)
LNCS
, vol.2587
-
-
Courtois, N.1
-
11
-
-
35248820612
-
Algebraic Attacks on Stream Ciphers with Linear Feedback
-
Eurocrypt 2003, Warsaw, Poland, Springer. An extended version is
-
Nicolas Courtois and Willi Meier: Algebraic Attacks on Stream Ciphers with Linear Feedback, Eurocrypt 2003, Warsaw, Poland, LNCS 2656, pp. 345-359, Springer. An extended version is available at http://www.minrank.org/toyolili.pdf
-
LNCS
, vol.2656
, pp. 345-359
-
-
Courtois, N.1
Meier, W.2
-
12
-
-
84937560136
-
The security of Hidden Field Equations (HFE)
-
Cryptographers' Track Rsa Conference 2001, San Francisco 8-12 April 2001, Springer, April
-
Nicolas Courtois: The security of Hidden Field Equations (HFE), Cryptographers' Track Rsa Conference 2001, San Francisco 8-12 April 2001, LNCS 2020, Springer, pp. 266-281, April 2001.
-
(2001)
LNCS
, vol.2020
, pp. 266-281
-
-
Courtois, N.1
-
13
-
-
84958765510
-
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
-
Asiacrypt 2002, Springer, a preprint with a different version of the attack is
-
Nicolas Courtois and Josef Pieprzyk, Cryptanalysis of Block Ciphers with Overdefined Systems of Equations, Asiacrypt 2002, LNCS 2501, Springer, a preprint with a different version of the attack is available at http://eprint.iacr.org/2002/044/.
-
LNCS
, vol.2501
-
-
Courtois, N.1
Pieprzyk, J.2
-
14
-
-
0023346708
-
On the Equivalence between Berlekamp's and Euclid's Algorithms
-
May
-
Jean-Louis Dornstetter: On the Equivalence Between Berlekamp's and Euclid's Algorithms. IEEE Trans. on Information Theory. IT-33(3): 428-431. May 1987.
-
(1987)
IEEE Trans. on Information Theory
, vol.IT-33
, Issue.3
, pp. 428-431
-
-
Dornstetter, J.-L.1
-
15
-
-
23044522041
-
Decimation Attack of Stream Ciphers
-
Indocrypt 2000
-
Eric Filiol: Decimation Attack of Stream Ciphers, Indocrypt 2000, LNCS 1977, pp. 31-42, 2000. Available on eprint.iacr.org/2000/040.
-
(2000)
LNCS
, vol.1977
, pp. 31-42
-
-
Filiol, E.1
-
16
-
-
84958983180
-
On the Security of Nonlinear Filter Generators
-
FSE'96, Springer
-
Jovan Dj. Golic: On the Security of Nonlinear Filter Generators, FSE'96, LNCS 1039, pp. 173-188, Springer, 1996.
-
(1996)
LNCS
, vol.1039
, pp. 173-188
-
-
Golic, J.Dj.1
-
17
-
-
84947279371
-
Linear Cryptanalysis of Bluetooth Stream Cipher
-
Eurocrypt 2002, Springer
-
Jovan Dj. Golic, Vittorio Bagini, Guglielmo Morgari: Linear Cryptanalysis of Bluetooth Stream Cipher, Eurocrypt 2002, LNCS 2332, pp. 238-255, Springer, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 238-255
-
-
Golic, J.Dj.1
Bagini, V.2
Morgari, G.3
-
19
-
-
84937740421
-
Shift-register synthesis and BCH decoding
-
J. L. Massey: Shift-register synthesis and BCH decoding, IEEE Trans. Information Theory, IT-15 (1969), 122-127.
-
(1969)
IEEE Trans. Information Theory
, vol.IT-15
, pp. 122-127
-
-
Massey, J.L.1
-
20
-
-
0024860262
-
East correlation attacks on certain stream ciphers
-
Willi Meier and Othmar Staffelbach: East correlation attacks on certain stream ciphers, Journal of Cryptology, 1(3):159-176, 1989.
-
(1989)
Journal of Cryptology
, vol.1
, Issue.3
, pp. 159-176
-
-
Meier, W.1
Staffelbach, O.2
-
22
-
-
0036458332
-
Cryptanalysis of Toyocrypt-HS1 stream cipher
-
Jan.
-
M. Mihaljevic, H. Imai: Cryptanalysis of Toyocrypt-HS1 stream cipher, IEICE Transactions on Fundamentals, vol. E85-A, pp. 66-73, Jan. 2002. Available at http://www.csl.sony.co.jp/ATL/papers/IEICEjan02.pdf.
-
(2002)
IEICE Transactions on Fundamentals
, vol.E85-A
, pp. 66-73
-
-
Mihaljevic, M.1
Imai, H.2
-
23
-
-
84957640013
-
Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88
-
Crypto'95, Springer
-
Jacques Patarin: Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88, Crypto'95, Springer, LNCS 963, pp. 248-261, 1995.
-
(1995)
LNCS
, vol.963
, pp. 248-261
-
-
Patarin, J.1
-
25
-
-
77649327985
-
Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations
-
Eurocrypt'2000, Springer
-
Adi Shamir, Jacques Patarin, Nicolas Courtois, Alexander Klimov, Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations, Eurocrypt'2000, LNCS 1807, pp. 392-407, Springer, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 392-407
-
-
Shamir, A.1
Patarin, J.2
Courtois, N.3
Klimov, A.4
-
26
-
-
84949212529
-
LILI Keystream Generator
-
SAC'2000, Springer
-
L. Simpson, E. Dawson, J. Golic and W. Millan: LILI Keystream Generator, SAC'2000, LNCS 2012, pp. 248-261, Springer, 2000. See www.isrc.qut.edu.au/lili/.
-
(2000)
LNCS
, vol.2012
, pp. 248-261
-
-
Simpson, L.1
Dawson, E.2
Golic, J.3
Millan, W.4
-
27
-
-
84949427555
-
A Time-Memory Tradeoff Attack Against LILI-128
-
FSE 2002, Springer
-
Markku-Juhani Olavi Saarinen: A Time-Memory Tradeoff Attack Against LILI-128, FSE 2002, LNCS 2365, pp. 231-236, Springer, 2002, available at http://eprint.iacr.org/2001/077/.
-
(2002)
LNCS
, vol.2365
, pp. 231-236
-
-
Saarinen, M.-J.O.1
|