-
1
-
-
33746062308
-
On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations
-
Paris, France, pp
-
Bardet, M., Faug̀re, J.-C., Salvy, B.: On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations. In: Proceedings of International Conference on Polynomial System Solving (ICPSS, Paris, France), pp. 71-75 (2004)
-
(2004)
Proceedings of International Conference on Polynomial System Solving (ICPSS
, pp. 71-75
-
-
Bardet, M.1
Faug̀re, J.-C.2
Salvy, B.3
-
2
-
-
84948988609
-
Advanced Slide Attacks
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Biryukov, A., Wagner, D.: Advanced Slide Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 589-606. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 589-606
-
-
Biryukov, A.1
Wagner, D.2
-
3
-
-
84957610784
-
-
Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, 1636, pp. 245-259. Springer, Heidelberg (1999)
-
Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245-259. Springer, Heidelberg (1999)
-
-
-
-
6
-
-
78049233064
-
Linear Slide Attacks on the KeeLoq Block Cipher
-
The 3rd SKLOIS Conference on Information Security and Cryptology Inscrypt, Springer, Heidelberg
-
Bogdanov, A.: Linear Slide Attacks on the KeeLoq Block Cipher. In: The 3rd SKLOIS Conference on Information Security and Cryptology (Inscrypt 2007). LNCS. Springer, Heidelberg (2007)
-
(2007)
LNCS
-
-
Bogdanov, A.1
-
7
-
-
38149133175
-
-
Cid, C., Babbage, S., Pramstaller, N., Raddum, H.: An Analysis of the Hermes8 Stream Cipher. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, 4586, pp. 1-10. Springer, Heidelberg (2007)
-
Cid, C., Babbage, S., Pramstaller, N., Raddum, H.: An Analysis of the Hermes8 Stream Cipher. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 1-10. Springer, Heidelberg (2007)
-
-
-
-
8
-
-
50249136190
-
-
Keeloq wikipedia article. On 25 January 2007 the specification given here was incorrect and was updated since, http://en.wikipedia.org/wiki/KeeLoq
-
Keeloq wikipedia article. On 25 January 2007 the specification given here was incorrect and was updated since, http://en.wikipedia.org/wiki/KeeLoq
-
-
-
-
9
-
-
50249144191
-
-
Keeloq C source code by Ruptor, http://cryptolib.com/ciphers/
-
Keeloq C source code by Ruptor, http://cryptolib.com/ciphers/
-
-
-
-
11
-
-
35248834096
-
-
Courtois, N., Patarin, J.: About the XL Algorithm over GF(2). In: Joye, M. (ed.) CT-RSA 2003. LNCS, 2612, pp. 141-157. Springer, Heidelberg (2003)
-
Courtois, N., Patarin, J.: About the XL Algorithm over GF(2). In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 141-157. Springer, Heidelberg (2003)
-
-
-
-
12
-
-
77649327985
-
Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Courtois, N., Shamir, A., Patarin, J., Klimov, A.: Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 392-407. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 392-407
-
-
Courtois, N.1
Shamir, A.2
Patarin, J.3
Klimov, A.4
-
13
-
-
84958765510
-
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
-
Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
-
Courtois, N., Pieprzyk, J.: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 267-287. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 267-287
-
-
Courtois, N.1
Pieprzyk, J.2
-
14
-
-
35248820612
-
Algebraic Attacks on Stream Ciphers with Linear Feedback
-
Biham, E, ed, EUROCRYPT 2003, Springer, Heidelberg
-
Courtois, N., Meier, W.: Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345-359. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 345-359
-
-
Courtois, N.1
Meier, W.2
-
15
-
-
24144472488
-
-
Courtois, N.: General Principles of Algebraic Attacks and New Design Criteria for Components of Symmetric Ciphers. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, 3373, pp. 67-83. Springer, Heidelberg (2005)
-
Courtois, N.: General Principles of Algebraic Attacks and New Design Criteria for Components of Symmetric Ciphers. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, vol. 3373, pp. 67-83. Springer, Heidelberg (2005)
-
-
-
-
16
-
-
24144445102
-
-
Courtois, N.: The Inverse S-box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, 3373, pp. 170-188. Springer, Heidelberg (2005)
-
Courtois, N.: The Inverse S-box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, vol. 3373, pp. 170-188. Springer, Heidelberg (2005)
-
-
-
-
17
-
-
50249182212
-
How Fast can be Algebraic Attacks on Block Ciphers?
-
Biham, E, Handschuh, H, Lucks, S, Rijmen, V, eds, January 07-12, 2007, ISSN 1862, 4405, http://eprint.iacr.org/2006/168
-
Courtois, N.T.: How Fast can be Algebraic Attacks on Block Ciphers? In: Biham, E., Handschuh, H., Lucks, S., Rijmen, V. (eds.) online proceedings of Dagstuhl Seminar 07021, Symmetric Cryptography (January 07-12, 2007), http://drops.dagstuhl.de/portals/index.php?semnr=07021, http://eprint.iacr.org/ 2006/168/ ISSN 1862 - 4405
-
online proceedings of Dagstuhl Seminar 07021, Symmetric Cryptography
-
-
Courtois, N.T.1
-
19
-
-
50249101780
-
-
Courtois, N., Bard, G.V.: Algebraic Cryptanalysis of the Data Encryption Standard. In: Cryptography and Coding, 11-th IMA Conference, Cirencester, UK, December 18-20, 2007. Springer, Heidelberg (2007), eprint.iacr.org/2006/402/; Also presented at ECRYPT workshop Tools for Cryptanalysis, Krakow, September 24-25 (2007)
-
Courtois, N., Bard, G.V.: Algebraic Cryptanalysis of the Data Encryption Standard. In: Cryptography and Coding, 11-th IMA Conference, Cirencester, UK, December 18-20, 2007. Springer, Heidelberg (2007), eprint.iacr.org/2006/402/; Also presented at ECRYPT workshop Tools for Cryptanalysis, Krakow, September 24-25 (2007)
-
-
-
-
21
-
-
50249184170
-
-
Courtois, N., Bard, G.V., Wagner, D.: Algebraic and Slide Attacks on KeeLoq, Older preprint with using incorrect specification of KeeLoq, eprint.iacr.org/2007/062/
-
Courtois, N., Bard, G.V., Wagner, D.: Algebraic and Slide Attacks on KeeLoq, Older preprint with using incorrect specification of KeeLoq, eprint.iacr.org/2007/062/
-
-
-
-
22
-
-
50249095258
-
-
preprint available from the authors
-
Courtois, N., Bard, G.V., Wagner, D.: An Improved Algebraic-Slide Attack on KeeLoq, A sequel to the oresent paper (preprint available from the authors)
-
An Improved Algebraic-Slide Attack on KeeLoq, A sequel to the oresent paper
-
-
Courtois, N.1
Bard, G.V.2
Wagner, D.3
-
23
-
-
50249133278
-
-
Biham, E., Dunkelman, O., Indesteege, S., Keller, N., Preneel, B.: How to Steal Cars - A Practical Attack on KeeLoq, Crypto 2007, rump session talk (2007); Full paper will be presented at Eurocrypt 2008 and published in Springer LNCS, http://www.cosic.esat.kuleuven.be/keeloq/keeloq-rump.pdf
-
Biham, E., Dunkelman, O., Indesteege, S., Keller, N., Preneel, B.: How to Steal Cars - A Practical Attack on KeeLoq, Crypto 2007, rump session talk (2007); Full paper will be presented at Eurocrypt 2008 and published in Springer LNCS, http://www.cosic.esat.kuleuven.be/keeloq/keeloq-rump.pdf
-
-
-
-
25
-
-
84925121989
-
-
Flajolet, P., Sedgewick, R.: Analytic Combinatorics, 807 pages. Cambridge University Press, Cambridge (to appear, 2008), http://algo.inria.fr/flajolet/ Publications/book.pdf
-
Flajolet, P., Sedgewick, R.: Analytic Combinatorics, 807 pages. Cambridge University Press, Cambridge (to appear, 2008), http://algo.inria.fr/flajolet/ Publications/book.pdf
-
-
-
-
26
-
-
35248898342
-
Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks
-
Lee, P.J, Lim, C.H, eds, ICISC 2002, Springer, Heidelberg
-
Phan, R.C.-W., Furuya, S.: Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 138-148. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2587
, pp. 138-148
-
-
Phan, R.C.-W.1
Furuya, S.2
-
27
-
-
84949982494
-
Slide Attacks with a Known-Plaintext Cryptanalysis
-
Kim, K.-c, ed, ICISC 2001, Springer, Heidelberg
-
Furuya, S.: Slide Attacks with a Known-Plaintext Cryptanalysis. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 214-225. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2288
, pp. 214-225
-
-
Furuya, S.1
-
28
-
-
38149057656
-
-
Granboulan, L., Pornin, T.: Perfect Block Ciphers with Small Blocks. In: Biryukov, A. (ed.) FSE 2007. LNCS, 4593, pp. 452-465. Springer, Heidelberg (2007)
-
Granboulan, L., Pornin, T.: Perfect Block Ciphers with Small Blocks. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 452-465. Springer, Heidelberg (2007)
-
-
-
-
30
-
-
85037173808
-
Analysis of a Feistel-like cipher weakened by having no rotating key, IBM Thomas J
-
6375
-
Grossman, E.K., Tuckerman, B.: Analysis of a Feistel-like cipher weakened by having no rotating key, IBM Thomas J. Watson Research Report RC 6375 (1977)
-
(1977)
Watson Research Report RC
-
-
Grossman, E.K.1
Tuckerman, B.2
-
31
-
-
50249125510
-
-
Kahn, D.: The Codebreakers, The Comprehensive History of Secret Communication from Ancient Times to the Internet (first published in 1967) (new chapter added in 1996)
-
Kahn, D.: The Codebreakers, The Comprehensive History of Secret Communication from Ancient Times to the Internet (first published in 1967) (new chapter added in 1996)
-
-
-
-
37
-
-
33749578685
-
-
Mironov, I., Zhang, L.: Applications of SAT Solvers to Cryptanalysis of Hash Functions. In: Biere, A., Gomes, C.P. (eds.) SAT 2006. LNCS, 4121, pp. 102-115. Springer, Heidelberg (2006), http://eprint.iacr.org/2006/254
-
Mironov, I., Zhang, L.: Applications of SAT Solvers to Cryptanalysis of Hash Functions. In: Biere, A., Gomes, C.P. (eds.) SAT 2006. LNCS, vol. 4121, pp. 102-115. Springer, Heidelberg (2006), http://eprint.iacr.org/2006/254
-
-
-
|