-
1
-
-
33746335696
-
Algebraic attacks on clock controlled stream ciphers
-
L. M. Batten and R. Safavi-Naini, editors, pages, Springer-Verlag
-
S. Al-Hinai, L. Batten, B. Colbert and K. Wong. Algebraic attacks on clock controlled stream ciphers. In L. M. Batten and R. Safavi-Naini, editors, Proceedings of Information Security and Privacy - 11th Australasian Conference, ACISP 2006, volume 4058 of Lecture Notes in Computer Science, pages 1–16. Springer-Verlag, 2006.
-
(2006)
Proceedings of Information Security and Privacy - 11Th Australasian Conference, ACISP 2006, Volume 4058 of Lecture Notes in Computer Science
, pp. 1-16
-
-
Al-Hinai, S.1
Batten, L.2
Colbert, B.3
Wong, K.4
-
2
-
-
35048863447
-
Comparison between XL and Gröbner basis algorithms
-
P. J. Lee, editor, pages, Springer-Verlag
-
G. Ars, J.-C. Faugère, H. Imai, M. Kawazoe, M. Sugita. Comparison between XL and Gröbner basis algorithms. In P. J. Lee, editor, Advances in Cryptology - ASIACRYPT 2004, volume 3329 of Lecture Notes in Computer Science, pages 338–353. Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology - ASIACRYPT 2004, Volume 3329 of Lecture Notes in Computer Science
, pp. 338-353
-
-
Ars, G.1
Faugère, J.-C.2
Imai, H.3
Kawazoe, M.4
Sugita, M.5
-
3
-
-
35048861887
-
Improving fast algebraic attacks
-
B. Roy and W. Meier, editors, pages, Springer-Verlag
-
F. Armknecht. Improving fast algebraic attacks. In B. Roy and W. Meier, editors, Fast Software Encryption - FSE 2004, volume 3017 of Lecture Notes in Computer Science, pages 65–82, Springer-Verlag, 2004.
-
(2004)
Fast Software Encryption - FSE 2004, Volume 3017 of Lecture Notes in Computer Science
, pp. 65-82
-
-
Armknecht, F.1
-
4
-
-
35248840147
-
Algebraic attacks on combiners with memory
-
D. Boneh, editor, pages, Springer-Verlag
-
F. Armknecht and M. Krause. Algebraic attacks on combiners with memory. In D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 162–175, Springer-Verlag, 2003.
-
(2003)
Advances in Cryptology - CRYPTO 2003, Volume 2729 of Lecture Notes in Computer Science
, pp. 162-175
-
-
Armknecht, F.1
Krause, M.2
-
5
-
-
33747612098
-
Lock-in Effect in Cascades of Clock-Controlled Shift-Registers
-
Christoph G. Günther, editor, pages, Springer-Verlag
-
W. G. Chambers and D. Gollmann. Lock-in Effect in Cascades of Clock-Controlled Shift-Registers. In Christoph G. Günther, editor, Advances in Cryptology - Proceedings of EUROCRYPT 88, volume 330 of Lecture Notes in Computer Science, pages 331–344. Springer-Verlag, 1988.
-
(1988)
Advances in Cryptology - Proceedings of EUROCRYPT 88, Volume 330 of Lecture Notes in Computer Science
, pp. 331-344
-
-
Chambers, W.G.1
Gollmann, D.2
-
6
-
-
84948971649
-
Two stream ciphers
-
R. Anderson, editor, Springer-Verlag
-
W. G. Chambers. Two stream ciphers. In R. Anderson, editor, Fast Software Encryption - FSE 1994, volume 809 of Lecture Notes in Computer Science, pages 51-55, Springer-Verlag, 1994.
-
(1994)
Fast Software Encryption - FSE 1994, Volume 809 of Lecture Notes in Computer Science
, pp. 51-55
-
-
Chambers, W.G.1
-
7
-
-
26444495490
-
Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering
-
B. Roy and W. Meier, editor, Springer-Verlag
-
J. Y. Cho and J. Pieprzyk. Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. In B. Roy and W. Meier, editor Fast Software Encryption - FSE 2004, volume 3017 of Lecture Notes in Computer Science, pages 49–64, Springer-Verlag, 2004.
-
(2004)
Fast Software Encryption - FSE 2004, Volume 3017 of Lecture Notes in Computer Science
, pp. 49-64
-
-
Cho, J.Y.1
Pieprzyk, J.2
-
8
-
-
85025635966
-
Cryptanalysis of Pomaranch
-
ECRYPT Stream Cipher Project, Report 2005/060
-
C. Cid, H. Gilbert and T. Johansson. Cryptanalysis of Pomaranch. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/060, 2005.
-
(2005)
Estream
-
-
Cid, C.1
Gilbert, H.2
Johansson, T.3
-
9
-
-
84937560136
-
The security of hidden field equations (HFE)
-
D. Naccache, editor, pages, Springer-Verlag
-
N. Courtois. The security of hidden field equations (HFE). In D. Naccache, editor, Progress in Cryptology - CT-RSA 2001, volume 2020 of Lecture Notes in Computer Science, pages 266–281, Springer-Verlag, 2001.
-
(2001)
Progress in Cryptology - CT-RSA 2001, Volume 2020 of Lecture Notes in Computer Science
, pp. 266-281
-
-
Courtois, N.1
-
10
-
-
24944457137
-
Algebraic attacks on combiners with memory and several outputs
-
C. Park, S. Chee, editors, pages, Springer-Verlag
-
N. Courtois. Algebraic attacks on combiners with memory and several outputs. In C. Park, S. Chee, editors, Information Security and Cryptology ICISC 2004, volume 3506 of Lecture Notes in Computer Science, pages 3–20, Springer-Verlag, 2005.
-
(2005)
Information Security and Cryptology ICISC 2004, Volume 3506 of Lecture Notes in Computer Science
, pp. 3-20
-
-
Courtois, N.1
-
11
-
-
35248849880
-
Fast algebraic attacks on stream ciphers with linear feedback
-
D. Boneh, editor, pages, Springer-Verlag
-
N. Courtois. Fast algebraic attacks on stream ciphers with linear feedback. In D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 176–194, Springer-Verlag, 2003.
-
(2003)
Advances in Cryptology - CRYPTO 2003, Volume 2729 of Lecture Notes in Computer Science
, pp. 176-194
-
-
Courtois, N.1
-
12
-
-
35248820612
-
Algebraic attacks on stream ciphers with linear feedback
-
E. Biham, editor, pages, Springer-Verlag
-
N. Courtois and W. Meier. Algebraic attacks on stream ciphers with linear feedback. In E. Biham, editor, Advances in Cryptology - Eurocrypt 2003, volume 2656 of Lecture Notes in Computer Science, pages 346–359, Springer-Verlag, 2003.
-
(2003)
Advances in Cryptology - Eurocrypt 2003, Volume 2656 of Lecture Notes in Computer Science
, pp. 346-359
-
-
Courtois, N.1
Meier, W.2
-
13
-
-
77649327985
-
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
-
B. Preneel, editor, pages, Springer-Verlag
-
N. Courtois, A. Klimov, J. Patarin, and A. Shamir. Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In B. Preneel, editor, Eurocrypt 2000. volume 1807 of Lecture Notes in Computer Science, pages 392-407, Springer-Verlag 2000.
-
(2000)
Eurocrypt 2000. Volume 1807 of Lecture Notes in Computer Science
, pp. 392-407
-
-
Courtois, N.1
Klimov, A.2
Patarin, J.3
Shamir, A.4
-
14
-
-
35248834096
-
About the XL algorithm over GF(2)
-
M. Joye, editor, pages, Springer-Verlag
-
N. Courtois, J. Patarin. About the XL algorithm over GF(2). In M. Joye, editor, Topics in Cryptology - CT-RSA 2003. volume 2612 of Lecture Notes in Computer Science, pages 141-157, Springer-Verlag 2003.
-
(2003)
Topics in Cryptology - CT-RSA 2003. Volume 2612 of Lecture Notes in Computer Science
, pp. 141-157
-
-
Courtois, N.1
Patarin, J.2
-
15
-
-
84958765510
-
Cryptanalysis of block ciphers with overdefined systems of equations
-
Y. Zheng, editor, pages, Springer-Verlag
-
N. Courtois and J. Pieprzyk. Cryptanalysis of block ciphers with overdefined systems of equations. In Y. Zheng, editor, Advances in Cryptology - ASIACRYPT 2002, volume 2501 of Lecture Notes in Computer Science, pages 267–287, Springer-Verlag, 2002.
-
(2002)
Advances in Cryptology - ASIACRYPT 2002, Volume 2501 of Lecture Notes in Computer Science
, pp. 267-287
-
-
Courtois, N.1
Pieprzyk, J.2
-
16
-
-
33746348686
-
On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions
-
L. M. Batten and R. Safavi-Naini, editors, pages, Springer-Verlag
-
N. Courtois, B. Debraize, and E. Garrido. On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions. In L. M. Batten and R. Safavi-Naini, editors, Proceedings of Information Security and Privacy - 11th Australasian Conference, ACISP 2006, volume 4058 of Lecture Notes in Computer Science, pages 76–86, Springer-Verlag, 2006.
-
(2006)
Proceedings of Information Security and Privacy - 11Th Australasian Conference, ACISP 2006, Volume 4058 of Lecture Notes in Computer Science
, pp. 76-86
-
-
Courtois, N.1
Debraize, B.2
Garrido, E.3
-
17
-
-
85034444570
-
Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers
-
T. Beth, N. Cot, and I. Ingemarsson, editors, pages, Springer-Verlag
-
D. Gollmann. Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers. In T. Beth, N. Cot, and I. Ingemarsson, editors, Advances in Cryptology - Proceedings of EUROCRYPT 84, volume 209 of Lecture Notes in Computer Science, pages 93–98, Springer-Verlag, 1985.
-
(1985)
Advances in Cryptology - Proceedings of EUROCRYPT 84, Volume 209 of Lecture Notes in Computer Science
, pp. 93-98
-
-
Gollmann, D.1
-
19
-
-
85025642713
-
And Analysis of a Family of Stream Ciphers
-
ECRYPT Stream Cipher Project, Report 2006/008
-
T. Helleseth, C. Jansen and A. Kholosha. Pomaranch - Design and Analysis of a Family of Stream Ciphers. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/008, 2005.
-
(2005)
Estream
-
-
Helleseth, T.1
Jansen, C.2
Kholosha, A.3
-
20
-
-
85025677782
-
On IV Setup of Pomaranch
-
eS-TREAM, ECRYPT Stream Cipher Project, Report 2005/082
-
M. Hasanzadeh, S. Khazaei and A. Kholosha. On IV Setup of Pomaranch. eS-TREAM, ECRYPT Stream Cipher Project, Report 2005/082, 2005.
-
(2005)
-
-
Hasanzadeh, M.1
Khazaei, S.2
Kholosha, A.3
-
21
-
-
68849115033
-
Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher (Version 3)
-
ECRYPT Stream Cipher Project, Report 2006/006
-
C. Jansen, T. Helleseth and A. Kholosha. Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher (Version 3). eSTREAM, ECRYPT Stream Cipher Project, Report 2006/006, 2006.
-
(2006)
Estream
-
-
Jansen, C.1
Helleseth, T.2
Kholosha, A.3
-
22
-
-
38149110644
-
Cryptanalysis of Pomaranch (CJCSG)
-
eSTREAM, ECRYPT Stream Cipher Project, Report 2005/065
-
S. Khazaei. Cryptanalysis of Pomaranch (CJCSG). eSTREAM, ECRYPT Stream Cipher Project, Report 2005/065. 2005.
-
(2005)
-
-
Khazaei, S.1
-
24
-
-
84957622876
-
On the security of the Gollmann cascades
-
D. Coppersmith, editor, pages, Springer-Verlag
-
S.J. Park, S.J. Lee, and S.C. Goh. On the security of the Gollmann cascades. In D. Coppersmith, editor, Advances in Cryptology CRYPTO 95, volume 963 of Lecture Notes in Computer Science, pages 148-156, Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology CRYPTO 95, Volume 963 of Lecture Notes in Computer Science
, pp. 148-156
-
-
Park, S.J.1
Lee, S.J.2
Goh, S.C.3
-
25
-
-
24944535234
-
All in the XL Family: Theory and Practice
-
C. Park, S. Chee, editors, pages, Springer-Verlag
-
B. Yang and J. Chen. All in the XL Family: Theory and Practice. In C. Park, S. Chee, editors, Information Security and Cryptology ICISC 2004. volume 3506 of Lecture Notes in Computer Science, pages 67-86, Springer-Verlag 2005.
-
(2005)
Information Security and Cryptology ICISC 2004. Volume 3506 of Lecture Notes in Computer Science
, pp. 67-86
-
-
Yang, B.1
Chen, J.2
-
26
-
-
27844468358
-
On the efficiency of the clock control guessing attack
-
P.J. Lee, C.H. Lim, editors, pages, Springer-Verlag
-
E. Zenner. On the efficiency of the clock control guessing attack. In P.J. Lee, C.H. Lim, editors, Information Security and Cryptology - ICISC 2002, volume 2587 of Lecture Notes in Computer Science, pages 200–212, Springer-Verlag, 2002.
-
(2002)
Information Security and Cryptology - ICISC 2002, Volume 2587 of Lecture Notes in Computer Science
, pp. 200-212
-
-
Zenner, E.1
|