-
3
-
-
38149128896
-
-
Augot, D., Biryukov, A., Canteaut, A., Cid, C., Courtois, N., Cannière, C.D., Gilbert, H., Lauradoux, C., Parker, M., Preneel, B., Robshaw, M., Seurin, Y.: AES Security Report, D.STVL.2 report, IST-2002-507932 ECRYPT European Network of Excellence in Cryptology, www.ecrypt.eu.org/ documents/D.STVL.2-1.0.pdf
-
Augot, D., Biryukov, A., Canteaut, A., Cid, C., Courtois, N., Cannière, C.D., Gilbert, H., Lauradoux, C., Parker, M., Preneel, B., Robshaw, M., Seurin, Y.: AES Security Report, D.STVL.2 report, IST-2002-507932 ECRYPT European Network of Excellence in Cryptology, www.ecrypt.eu.org/ documents/D.STVL.2-1.0.pdf
-
-
-
-
4
-
-
0026397734
-
Differential Cryptanalysis of DES-like Cryptosystems
-
Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology (IACR) 4, 3-72 (1991)
-
(1991)
Journal of Cryptology (IACR)
, vol.4
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
5
-
-
85034623360
-
Cryptanalysis of DES with a Reduced Number of Rounds
-
Williams, H.C, ed, CRYPTO 1985, Springer, Heidelberg
-
Chaum, D., Evertse, J.-H.: Cryptanalysis of DES with a Reduced Number of Rounds. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 192-211. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.218
, pp. 192-211
-
-
Chaum, D.1
Evertse, J.-H.2
-
6
-
-
21144445497
-
-
Tardy-Corfdir, A., Gilbert, H.: A Known Plaintext Attack of FEAL-4 and FEAL-6. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, 576, pp. 172-181. Springer, Heidelberg (1992)
-
Tardy-Corfdir, A., Gilbert, H.: A Known Plaintext Attack of FEAL-4 and FEAL-6. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 172-181. Springer, Heidelberg (1992)
-
-
-
-
7
-
-
38149042351
-
The development of DES, Invited Talk
-
Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
-
Coppersmith, D.: The development of DES, Invited Talk. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
-
-
Coppersmith, D.1
-
9
-
-
24144472488
-
-
Courtois, N.: General Principles of Algebraic Attacks and New Design Criteria for Components of Symmetric Ciphers. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, 3373, pp. 67-83. Springer, Heidelberg (2005)
-
Courtois, N.: General Principles of Algebraic Attacks and New Design Criteria for Components of Symmetric Ciphers. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, vol. 3373, pp. 67-83. Springer, Heidelberg (2005)
-
-
-
-
10
-
-
85005999755
-
How Fast can be Algebraic Attacks on Block Ciphers?
-
Biham, E, Handschuh, H, Lucks, S, Rijmen, V, eds, January 07-12
-
Courtois, N.T.: How Fast can be Algebraic Attacks on Block Ciphers? In: Biham, E., Handschuh, H., Lucks, S., Rijmen, V. (eds.) Symmetric Cryptography (January 07-12, 2007), http://drops.dagstuhl.de/portals/index.php?semnr=07021
-
(2007)
Symmetric Cryptography
-
-
Courtois, N.T.1
-
11
-
-
38149080193
-
-
Courtois, N., Bard, G.V., Wagner, D.: Algebraic and Slide Attacks on KeeLoq, (preprint) http://eprint.iacr.org/2007/062/
-
Algebraic and Slide Attacks on KeeLoq, (preprint)
-
-
Courtois, N.1
Bard, G.V.2
Wagner, D.3
-
12
-
-
77649327985
-
Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Courtois, N., Shamir, A., Patarin, J., Klimov, A.: Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 392-407. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 392-407
-
-
Courtois, N.1
Shamir, A.2
Patarin, J.3
Klimov, A.4
-
13
-
-
84937560136
-
-
Courtois, N.: The security of Hidden Field Equations (HFE). In: Naccache, D. (ed.) CT-RSA 2001. LNCS, 2020, pp. 266-281. Springer, Heidelberg (2001)
-
Courtois, N.: The security of Hidden Field Equations (HFE). In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 266-281. Springer, Heidelberg (2001)
-
-
-
-
14
-
-
84958765510
-
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
-
Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
-
Courtois, N., Pieprzyk, J.: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 267-287. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 267-287
-
-
Courtois, N.1
Pieprzyk, J.2
-
17
-
-
35248820612
-
Algebraic Attacks on Stream Ciphers with Linear Feedback
-
Biham, E, ed, Eurocrypt 2003, Springer, Heidelberg
-
Courtois, N., Meier, W.: Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Biham, E. (ed.) Eurocrypt 2003. LNCS, vol. 2656, pp. 345-359. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 345-359
-
-
Courtois, N.1
Meier, W.2
-
19
-
-
35248849880
-
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Courtois, N.: Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 177-194. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 177-194
-
-
Courtois, N.1
-
20
-
-
24944457137
-
-
Courtois, N.: Algebraic Attacks on Combiners with Memory and Several Outputs. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, 3506, Springer, Heidelberg (2005), http://eprint.iacr.org/2003/125/
-
Courtois, N.: Algebraic Attacks on Combiners with Memory and Several Outputs. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, Springer, Heidelberg (2005), http://eprint.iacr.org/2003/125/
-
-
-
-
21
-
-
24144445102
-
The Inverse S-box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers
-
Dobbertin, H, Rijmen, V, Sowa, A, eds, AES 4 Conference, Bonn, Springer, Heidelberg
-
Courtois, N.: The Inverse S-box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 4 Conference, Bonn. LNCS, vol. 3373, pp. 170-188. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3373
, pp. 170-188
-
-
Courtois, N.1
-
22
-
-
35248834096
-
-
Courtois, N., Patarin, J.: About the XL Algorithm over GF(2), Cryptographers. In: Joye, M. (ed.) CT-RSA 2003. LNCS, 2612, pp. 141-157. Springer, Heidelberg (2003)
-
Courtois, N., Patarin, J.: About the XL Algorithm over GF(2), Cryptographers. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 141-157. Springer, Heidelberg (2003)
-
-
-
-
23
-
-
38149007499
-
-
Davio, M., Desmedt, Y., Fosseprez, M., Govaerts, R., Hulsbosch, J., Neutjens, P., Piret, P., Quisquater, J.-J., Vandewalle, J., Wouters, P.: Analytical Characteristics of the DES. In: Crypto 1983, pp. 171-202. Plenum Press, New York (1984)
-
Davio, M., Desmedt, Y., Fosseprez, M., Govaerts, R., Hulsbosch, J., Neutjens, P., Piret, P., Quisquater, J.-J., Vandewalle, J., Wouters, P.: Analytical Characteristics of the DES. In: Crypto 1983, pp. 171-202. Plenum Press, New York (1984)
-
-
-
-
24
-
-
24144491738
-
A new efficient algorithm for computing Gröbner bases without reduction to zero (F5)
-
Catania, Italy, 3-6 April, ACM Press, New York
-
Faugère, J.C.: A new efficient algorithm for computing Gröbner bases without reduction to zero (F5). In: Workshop on Applications of Commutative Algebra, Catania, Italy, 3-6 April 2002, ACM Press, New York (2002)
-
(2002)
Workshop on Applications of Commutative Algebra
-
-
Faugère, J.C.1
-
27
-
-
35248840150
-
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Joux, A., Faugère, J.-C.: Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 44-60. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 44-60
-
-
Joux, A.1
Faugère, J.-C.2
-
28
-
-
84957694404
-
Cryptanalysis of Block Ciphers with Probabilistic Non-Linear Relations of Low Degree
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Jakobsen, T.: Cryptanalysis of Block Ciphers with Probabilistic Non-Linear Relations of Low Degree. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 212-222. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 212-222
-
-
Jakobsen, T.1
-
29
-
-
38149002632
-
-
Kim, K., Lee, S., Park, S., Lee, D.: Securing DES S-boxes against Three Robust Cryptanalysis. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, 2595, pp. 145-157. Springer, Heidelberg (2003)
-
Kim, K., Lee, S., Park, S., Lee, D.: Securing DES S-boxes against Three Robust Cryptanalysis. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 145-157. Springer, Heidelberg (2003)
-
-
-
-
33
-
-
0034140491
-
-
Massacci, F., Marraro, L.: Logical cryptanalysis as a SAT-problem: Encoding and analysis of the U.SS. Data Encryption Standard. Journal of Automated Reasoning 24, 165-203 (2000). And In: Gent, J., van Maaren, H., Walsh, T. (eds.) The proceedings of SAT-2000 conference, Highlights of Satisfiability Research at the Year 2000, pp. 343-376. IOS Press, Amsterdam (2000)
-
Massacci, F., Marraro, L.: Logical cryptanalysis as a SAT-problem: Encoding and analysis of the U.SS. Data Encryption Standard. Journal of Automated Reasoning 24, 165-203 (2000). And In: Gent, J., van Maaren, H., Walsh, T. (eds.) The proceedings of SAT-2000 conference, Highlights of Satisfiability Research at the Year 2000, pp. 343-376. IOS Press, Amsterdam (2000)
-
-
-
-
34
-
-
85025704284
-
Linear Cryptanalysis Method for DES Cipher
-
Helleseth, T, ed, EUROCRYPT 1993, Springer, Heidelberg
-
Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386-397. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
35
-
-
57649214960
-
-
2.0. An open-source SAT solver package
-
Eén, N., Sörensson, N.: MiniSat 2.0. An open-source SAT solver package, http://www.cs.Chalmers.se/Cs/Research/FormalMethods/MiniSat/
-
MiniSat
-
-
Eén, N.1
Sörensson, N.2
-
36
-
-
33749578685
-
-
Mironov, I., Zhang, L.: Applications of SAT Solvers to Cryptanalysis of Hash Functions. In: Biere, A., Gomes, C.P. (eds.) SAT 2006. LNCS, 4121, pp. 102-115. Springer, Heidelberg (2006), http://eprint.iacr.org/2006/254
-
Mironov, I., Zhang, L.: Applications of SAT Solvers to Cryptanalysis of Hash Functions. In: Biere, A., Gomes, C.P. (eds.) SAT 2006. LNCS, vol. 4121, pp. 102-115. Springer, Heidelberg (2006), http://eprint.iacr.org/2006/254
-
-
-
-
37
-
-
84937413721
-
Essential Algebraic Structure within the AES
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Murphy, S., Robshaw, M.: Essential Algebraic Structure within the AES. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
-
-
Murphy, S.1
Robshaw, M.2
-
38
-
-
84957640013
-
-
Patarin, J.: Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt 1988. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, 963, pp. 248-261. Springer, Heidelberg (1995)
-
Patarin, J.: Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt 1988. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 248-261. Springer, Heidelberg (1995)
-
-
-
-
40
-
-
38149123689
-
Solving MRHS linear equations
-
Krakow, Poland September 24-25, accepted
-
Raddum, H., Semaev, I.: Solving MRHS linear equations. In: ECRYPT Tools for Cryptanalysis workshop, Krakow, Poland (September 24-25, 2007) (accepted)
-
(2007)
ECRYPT Tools for Cryptanalysis workshop
-
-
Raddum, H.1
Semaev, I.2
-
42
-
-
1442325710
-
On the security of DES
-
Williams, H.C ed, CRYPTO 1985, Springer, Heidelberg
-
Shamir, A.: On the security of DES. In: Williams, H.C (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 280-281. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.218
, pp. 280-281
-
-
Shamir, A.1
-
43
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon, C.E.: Communication theory of secrecy systems. Bell System Technical Journal 28, 704 (1949)
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 704
-
-
Shannon, C.E.1
-
44
-
-
0020928825
-
Cryptanalysis of the Data Encryption Standard by the Method of Formal Coding
-
Beth, T, ed, Cryptography, Springer, Heidelberg
-
Schaumuller-Bichl, I.: Cryptanalysis of the Data Encryption Standard by the Method of Formal Coding. In: Beth, T. (ed.) Cryptography. LNCS, vol. 149, Springer, Heidelberg (1983)
-
(1983)
LNCS
, vol.149
-
-
Schaumuller-Bichl, I.1
|