-
1
-
-
35248821354
-
Testing low-degree polynomials over GF
-
Arora, S, Jansen, K, Rolim, J.D.P, Sahai, A, eds, RANDOM 2003 and APPROX 2003, Springer, Heidelberg
-
Alon, N., Kaufman, T., Krivelevich, M., Litsyn, S., Ron, D.: Testing low-degree polynomials over GF(2). In: Arora, S., Jansen, K., Rolim, J.D.P., Sahai, A. (eds.) RANDOM 2003 and APPROX 2003. LNCS, vol. 2764, pp. 188-199. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2764
, pp. 188-199
-
-
Alon, N.1
Kaufman, T.2
Krivelevich, M.3
Litsyn, S.4
Ron, D.5
-
2
-
-
38149004458
-
Analysis of multivariate hash functions
-
Nam, K.-H, Rhee, G, eds, ICISC 2007, Springer, Heidelberg
-
Aumasson, J.-P., Meier, W.: Analysis of multivariate hash functions. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 309-323. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4817
, pp. 309-323
-
-
Aumasson, J.-P.1
Meier, W.2
-
3
-
-
84888075580
-
Keccak specifications
-
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak specifications. Submission to NIST 2008 (2008), http://keccak.noekeon.org/
-
(2008)
Submission to NIST
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
4
-
-
38149109062
-
-
Billet, O., Robshaw, M.J.B., Peyrin, T.: On building hash functions from multivariate quadratic equations. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, 4586, pp. 82-95. Springer, Heidelberg (2007)
-
Billet, O., Robshaw, M.J.B., Peyrin, T.: On building hash functions from multivariate quadratic equations. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 82-95. Springer, Heidelberg (2007)
-
-
-
-
5
-
-
0025022876
-
-
Blum, M., Luby, M., Rubinfeld, R.: Self-testing/correcting with applications to numerical problems. In: STOC., pp. 73-83. ACM, New York (1990)
-
Blum, M., Luby, M., Rubinfeld, R.: Self-testing/correcting with applications to numerical problems. In: STOC., pp. 73-83. ACM, New York (1990)
-
-
-
-
6
-
-
48249107069
-
-
De Cannière, C., Preneel, B.: Trivium. In: Robshaw, M.J.B., Billet, O. (eds.) New Stream Cipher Designs. LNCS, 4986, pp. 244-266. Springer, Heidelberg (2008)
-
De Cannière, C., Preneel, B.: Trivium. In: Robshaw, M.J.B., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 244-266. Springer, Heidelberg (2008)
-
-
-
-
8
-
-
58549091557
-
Cube attacks on tweakable black box polynomials. IACR ePrint Archive
-
Report 2008/385, version 20080914:160327
-
Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. IACR ePrint Archive, Report 2008/385, version 20080914:160327 (2008), http://eprint.iacr.org/2008/385
-
(2008)
-
-
Dinur, I.1
Shamir, A.2
-
9
-
-
67650699727
-
-
Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, 5479, pp. 278-299. Springer, Heidelberg (2009); see also [8]
-
Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 278-299. Springer, Heidelberg (2009); see also [8]
-
-
-
-
10
-
-
38349025631
-
A framework for chosen IV statistical analysis of stream ciphers
-
Srinathan, K, Rangan, C.P, Yung, M, eds, INDOCRYPT 2007, Springer, Heidelberg
-
Englund, H., Johansson, T., Turan, M.S.: A framework for chosen IV statistical analysis of stream ciphers. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 268-281. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4859
, pp. 268-281
-
-
Englund, H.1
Johansson, T.2
Turan, M.S.3
-
11
-
-
84944068664
-
A new statistical testing for symmetric ciphers and hash functions
-
Deng, R.H, Qing, S, Bao, F, Zhou, J, eds, ICICS 2002, Springer, Heidelberg
-
Filiol, E.: A new statistical testing for symmetric ciphers and hash functions. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 342-353. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2513
, pp. 342-353
-
-
Filiol, E.1
-
12
-
-
45449101664
-
Chosen IV statistical analysis for key recovery attacks on stream ciphers
-
Vaudenay, S, ed, AFRICACRYPT 2008, Springer, Heidelberg
-
Fischer, S., Khazaei, S., Meier, W.: Chosen IV statistical analysis for key recovery attacks on stream ciphers. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 236-245. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5023
, pp. 236-245
-
-
Fischer, S.1
Khazaei, S.2
Meier, W.3
-
13
-
-
17744373121
-
Testing polynomials over general fields. In: FOCS
-
Los Alamitos
-
Kaufman, T., Ron, D.: Testing polynomials over general fields. In: FOCS, pp. 413-422. IEEE Computer Society, Los Alamitos (2004)
-
(2004)
IEEE Computer Society
, pp. 413-422
-
-
Kaufman, T.1
Ron, D.2
-
14
-
-
57049100995
-
-
Kaufman, T., Sudan, M.: Algebraic property testing: the role of invariance. In: Ladner, R.E., Dwork, C. (eds.) STOC., pp. 403-412. ACM, New York (2008)
-
Kaufman, T., Sudan, M.: Algebraic property testing: the role of invariance. In: Ladner, R.E., Dwork, C. (eds.) STOC., pp. 403-412. ACM, New York (2008)
-
-
-
-
15
-
-
58549086616
-
New directions in cryptanalysis of self-synchronizing stream ciphers
-
Chowdhury, D.R, Rijmen, V, Das, A, eds, INDOCRYPT 2008, Springer, Heidelberg
-
Khazaei, S., Meier, W.: New directions in cryptanalysis of self-synchronizing stream ciphers. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 15-26. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5365
, pp. 15-26
-
-
Khazaei, S.1
Meier, W.2
-
16
-
-
84948949623
-
-
Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, 1008, pp. 196-211. Springer, Heidelberg (1995)
-
Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 196-211. Springer, Heidelberg (1995)
-
-
-
-
17
-
-
70350403182
-
-
Lucks, S.: The saturation attack - a bait for Twofish. In: Matsui, M. (ed.) FSE 2001. LNCS, 2355, pp. 1-15. Springer, Heidelberg (2001)
-
Lucks, S.: The saturation attack - a bait for Twofish. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 1-15. Springer, Heidelberg (2001)
-
-
-
-
19
-
-
38549124306
-
-
Maximov, A., Biryukov, A.: Two trivial attacks on Trivium. In: Adams, C.M., Miri, A., Wiener, M.J. (eds.) SAC 2007. LNCS, 4876, pp. 36-55. Springer, Heidelberg (2007)
-
Maximov, A., Biryukov, A.: Two trivial attacks on Trivium. In: Adams, C.M., Miri, A., Wiener, M.J. (eds.) SAC 2007. LNCS, vol. 4876, pp. 36-55. Springer, Heidelberg (2007)
-
-
-
-
20
-
-
38149055134
-
Attacking Bivium with MiniSat. eS-TREAM
-
ECRYPT Stream Cipher Project, Report 2007/040
-
McDonald, C., Charnes, C., Pieprzyk, J.: Attacking Bivium with MiniSat. eS-TREAM, ECRYPT Stream Cipher Project, Report 2007/040 (2007)
-
(2007)
-
-
McDonald, C.1
Charnes, C.2
Pieprzyk, J.3
-
21
-
-
67650699139
-
Algebraic structure defectoscopy. IACR ePrint Archive
-
Report 2007/378
-
O'Neil, S.: Algebraic structure defectoscopy. IACR ePrint Archive, Report 2007/378 (2007), http://eprint.iacr.org/2007/378
-
(2007)
-
-
O'Neil, S.1
-
22
-
-
70350372731
-
Transforming chosen iv attack into a key differential attack: How to break TRIVIUM and similar designs. IACR ePrint Archive
-
Report 2008/443
-
Pasalic, E.: Transforming chosen iv attack into a key differential attack: how to break TRIVIUM and similar designs. IACR ePrint Archive, Report 2008/443 (2008), http://eprint.iacr.org/2008/443
-
(2008)
-
-
Pasalic, E.1
-
23
-
-
57049177122
-
Cryptanalytic results on Trivium. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2005/001
-
Raddum, H.: Cryptanalytic results on Trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/001 (2006)
-
(2006)
-
-
Raddum, H.1
-
24
-
-
70350372733
-
The MD6 hash function
-
Rivest, R.L.: The MD6 hash function. Invited talk at CRYPTO 2008 (2008), http://people.csail.mit.edu/rivest/
-
(2008)
Invited talk at CRYPTO
-
-
Rivest, R.L.1
-
25
-
-
70350403187
-
-
Rivest, R.L., Agre, B., Bailey, D.V., Crutchfield, C., Dodis, Y., Fleming, K.E., Khan, A., Krishnamurthy, J., Lin, Y., Reyzin, L., Shen, E., Sukha, J., Sutherland, D., Tromer, E., Yin, Y.L.: The MD6 hash function - a proposal to NIST for SHA-3, http://groups.csail.mit.edu/cis/md6/
-
The MD6 hash function - a proposal to NIST for SHA-3
-
-
Rivest, R.L.1
Agre, B.2
Bailey, D.V.3
Crutchfield, C.4
Dodis, Y.5
Fleming, K.E.6
Khan, A.7
Krishnamurthy, J.8
Lin, Y.9
Reyzin, L.10
Shen, E.11
Sukha, J.12
Sutherland, D.13
Tromer, E.14
Yin, Y.L.15
-
26
-
-
0030128622
-
Robust characterizations of polynomials with applications to program testing
-
Rubinfeld, R., Sudan, M.: Robust characterizations of polynomials with applications to program testing. SIAM J. Comput. 25(2), 252-271 (1996)
-
(1996)
SIAM J. Comput
, vol.25
, Issue.2
, pp. 252-271
-
-
Rubinfeld, R.1
Sudan, M.2
-
27
-
-
77954090834
-
-
Saarinen, M.-J.O.: Chosen-IV statistical attacks on eStream ciphers. In: Malek, M., Fernández-Medina, E., Hernando, J. (eds.) SECRYPT, pp. 260-266. INSTICC Press (2006)
-
Saarinen, M.-J.O.: Chosen-IV statistical attacks on eStream ciphers. In: Malek, M., Fernández-Medina, E., Hernando, J. (eds.) SECRYPT, pp. 260-266. INSTICC Press (2006)
-
-
-
-
28
-
-
35448956815
-
-
Samorodnitsky, A.: Low-degree tests at large distances. In: Johnson, D.S., Feige, U. (eds.) STOC., pp. 506-515. ACM, New York (2007)
-
Samorodnitsky, A.: Low-degree tests at large distances. In: Johnson, D.S., Feige, U. (eds.) STOC., pp. 506-515. ACM, New York (2007)
-
-
-
-
29
-
-
70350404093
-
How to solve it: New techniques in algebraic cryptanalysis
-
Shamir, A.: How to solve it: New techniques in algebraic cryptanalysis. Invited talk at CRYPTO 2008 (2008)
-
(2008)
Invited talk at CRYPTO
-
-
Shamir, A.1
-
30
-
-
84878102737
-
The dichotomy between structure and randomness, arithmetic progressions, and the primes
-
European Mathematical Society
-
Tao, T.: The dichotomy between structure and randomness, arithmetic progressions, and the primes. In: International Congress of Mathematicians, pp. 581-608. European Mathematical Society (2006)
-
(2006)
International Congress of Mathematicians
, pp. 581-608
-
-
Tao, T.1
-
31
-
-
48249097255
-
Linear approximations for 2-round Trivium. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2007/008
-
Turan, M.S., Kara, O.: Linear approximations for 2-round Trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/008 (2007)
-
(2007)
-
-
Turan, M.S.1
Kara, O.2
-
32
-
-
70350421152
-
-
Vielhaber, M.: Breaking ONE.FIVIUM by AIDA an algebraic IV differential attack. IACR ePrint Archive, Report 2007/413 (2007), http://eprint.iacr.org/ 2007/413
-
Vielhaber, M.: Breaking ONE.FIVIUM by AIDA an algebraic IV differential attack. IACR ePrint Archive, Report 2007/413 (2007), http://eprint.iacr.org/ 2007/413
-
-
-
|