-
2
-
-
70350378884
-
Algebraic Techniques in Differential Cryptanalysis
-
Dunkelman, O. (ed.) FSE 2009. Springer, Heidelberg
-
Albrecht, M., Cid, C.: Algebraic Techniques in Differential Cryptanalysis. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 193-208. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5665
, pp. 193-208
-
-
Albrecht, M.1
Cid, C.2
-
3
-
-
35248840147
-
Algebraic Attacks on Combiners with Memory
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Armknecht, F., Krause, M.: Algebraic Attacks on Combiners with Memory. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 162-175. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 162-175
-
-
Armknecht, F.1
Krause, M.2
-
4
-
-
35048863447
-
Comparison between XL and Grobner Basis Algorithms
-
Lee, P.J. (ed.) ASIACRYPT 2004. Springer, Heidelberg
-
Ars, G., Faugre, J.C., Imai, H., Kawazoe, M., Sugita, M.: Comparison Between XL and Grobner Basis Algorithms. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 338-353. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3329
, pp. 338-353
-
-
Ars, G.1
Faugre, J.C.2
Imai, H.3
Kawazoe, M.4
Sugita, M.5
-
5
-
-
38049063339
-
Asymptotic Expansion of the Degree of Regularity for Semi-Regular Systems of Equations
-
Bardet, M., Faugère, J.-C., Salvy, B., Yang, B.-Y.: Asymptotic Expansion of the Degree of Regularity for Semi-Regular Systems of Equations. In: MEGA 2005, Sardinia, Italy (2005)
-
(2005)
MEGA 2005, Sardinia, Italy
-
-
Bardet, M.1
Faugère, J.-C.2
Salvy, B.3
Yang, B.-Y.4
-
7
-
-
33646807471
-
An Analysis of the XSL Algorithm
-
Roy, B. (ed.) ASIACRYPT 2005. Springer, Heidelberg
-
Cid, C., Leurent, G.: An Analysis of the XSL Algorithm. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 333-352. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 333-352
-
-
Cid, C.1
Leurent, G.2
-
8
-
-
77649327985
-
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Courtois, N.T., Klimov, A.B., Patarin, J., Shamir, A.: Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 392-407. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 392-407
-
-
Courtois, N.T.1
Klimov, A.B.2
Patarin, J.3
Shamir, A.4
-
9
-
-
35248834096
-
About the XL Algorithm over GF(2)
-
Joye, M. (ed.) CT-RSA 2003. Springer, Heidelberg
-
Courtois, N., Patarin, J.: About the XL Algorithm over GF(2). In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 141-157. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2612
, pp. 141-157
-
-
Courtois, N.1
Patarin, J.2
-
10
-
-
84958765510
-
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
-
Zheng, Y. (ed.) ASIACRYPT 2002. Springer, Heidelberg
-
Courtois, N.T., Pieprzyk, J.: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 267-287. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 267-287
-
-
Courtois, N.T.1
Pieprzyk, J.2
-
11
-
-
24944450905
-
The XL-Algorithm and a Conjecture from Commutative Algebra
-
Lee, P.J. (ed.) ASIACRYPT 2004. Springer, Heidelberg
-
Diem, C.: The XL-Algorithm and a Conjecture from Commutative Algebra. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 323-337. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3329
, pp. 323-337
-
-
Diem, C.1
-
12
-
-
84882571379
-
Multivariate Public-Key Cryptosystems
-
Springer, Heidelberg ISBN 0-387-32229-9
-
Ding, J., Gower, J., Schmidt, D.: Multivariate Public-Key Cryptosystems. In: Advances in Information Security. Springer, Heidelberg (2006) ISBN 0-387-32229-9
-
(2006)
Advances in Information Security
-
-
Ding, J.1
Gower, J.2
Schmidt, D.3
-
15
-
-
0003498504
-
-
7th edn. Academic Press, San Diego
-
Gradsteyn, S., Ryzhik, I.M.: Table of Integrals, Series, and Products, 7th edn. Academic Press, San Diego (2007)
-
(2007)
Table of Integrals, Series, and Products
-
-
Gradsteyn, S.1
Ryzhik, I.M.2
-
16
-
-
33750240825
-
Cryptanalysis of Variants of UOV
-
Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. Springer, Heidelberg
-
Hu, Y.-H., Chou, C.-Y., Wang, L.-C., Lai, F.: Cryptanalysis of Variants of UOV. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 161-170. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4176
, pp. 161-170
-
-
Hu, Y.-H.1
Chou, C.-Y.2
Wang, L.-C.3
Lai, F.4
-
18
-
-
25844446805
-
On the Method of "XL" and Its Inefficiency to TTM
-
Moh, T.T.: On The Method of "XL" And Its Inefficiency to TTM, IACR eprint server (2001), http://eprint.iacr.org/2001/047
-
(2001)
IACR Eprint Server
-
-
Moh, T.T.1
-
19
-
-
56449125771
-
Number of Linearly Independent Equations Generated by XL
-
Golomb, S.W., Parker, M.G., Pott, A., Winterhof, A. (eds.) SETA 2008. Springer, Heidelberg
-
Rønjom, S., Raddum, H.: Number of Linearly Independent Equations Generated by XL. In: Golomb, S.W., Parker, M.G., Pott, A., Winterhof, A. (eds.) SETA 2008. LNCS, vol. 5203, pp. 239-251. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5203
, pp. 239-251
-
-
Rønjom, S.1
Raddum, H.2
-
20
-
-
51349154683
-
On solving sparse algebraic equations over finite fields
-
Semaev, I.: On solving sparse algebraic equations over finite fields. Journal of Designs, Codes and Cryptography 49(1-3), 47-60 (2008)
-
(2008)
Journal of Designs, Codes and Cryptography
, vol.49
, Issue.1-3
, pp. 47-60
-
-
Semaev, I.1
-
21
-
-
38149055208
-
Algebraic Attacks on Clock- Controlled Cascade Ciphers
-
Barua, R., Lange, T. (eds.) INDOCRYPT 2006. Springer, Heidelberg
-
Wong, K.K.-H., Colbert, B., Batten, L., Al-Hinai, S.: Algebraic Attacks on Clock- Controlled Cascade Ciphers. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 32-47. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4329
, pp. 32-47
-
-
Wong, K.K.-H.1
Colbert, B.2
Batten, L.3
Al-Hinai, S.4
-
22
-
-
33646770907
-
Theoretical Analysis of XL over Small Fields
-
Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. Springer, Heidelberg
-
Yang, B.-Y., Chen, J.-M.: Theoretical Analysis of XL over Small Fields. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 277-288. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3108
, pp. 277-288
-
-
Yang, B.-Y.1
Chen, J.-M.2
-
23
-
-
33646811417
-
On Asymptotic Security Estimates in XL and Grobner Bases-Related Algebraic Cryptanalysis
-
López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. Springer, Heidelberg
-
Yang, B.-Y., Chen, J.-M., Courtois, N.: On Asymptotic Security Estimates in XL and Grobner Bases-Related Algebraic Cryptanalysis. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 401-413. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3269
, pp. 401-413
-
-
Yang, B.-Y.1
Chen, J.-M.2
Courtois, N.3
-
24
-
-
24944535234
-
All in the XL Family: Theory and Practice
-
Park, C.-s., Chee, S. (eds.) ICISC 2004. Springer, Heidelberg
-
Yang, B.-Y., Chen, J.-M.: All in the XL Family: Theory and Practice. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 67-86. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3506
, pp. 67-86
-
-
Yang, B.-Y.1
Chen, J.-M.2
-
25
-
-
38149053130
-
Analysis of QUAD
-
Biryukov, A. (ed.) FSE 2007. Springer, Heidelberg
-
Yang, B.-Y., Chen, C.-H., Bernstein, D.J., Chen, J.-M.: Analysis of QUAD. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 290-308. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4593
, pp. 290-308
-
-
Yang, B.-Y.1
Chen, C.-H.2
Bernstein, D.J.3
Chen, J.-M.4
|