-
1
-
-
84958765510
-
Cryptanalysis of block ciphers with overdefined systems of equations
-
Zheng, Y. (ed.) ASIACRYPT 2002. Springer, Heidelberg
-
Courtois, N., Pieprzyk, J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 267-287. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 267-287
-
-
Courtois, N.1
Pieprzyk, J.2
-
2
-
-
38149068190
-
Algebraic cryptanalysis of the data encryption standard
-
Galbraith, S.D. (ed.) Cryptography and Coding 2007. Springer, Heidelberg
-
Courtois, N., Bard, G.V.: Algebraic cryptanalysis of the data encryption standard. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, vol. 4887, pp. 152-169. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4887
, pp. 152-169
-
-
Courtois, N.1
Bard, G.V.2
-
3
-
-
38149125515
-
Attacking reduced-round versions of the sms4 block cipher in the chinese wapi standard
-
Qing, S., Imai, H.,Wang, G. (eds.) ICICS 2007. Springer, Heidelberg
-
Lu, J.: Attacking reduced-round versions of the sms4 block cipher in the chinese wapi standard. In: Qing, S., Imai, H.,Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 306-318. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4861
, pp. 306-318
-
-
Lu, J.1
-
4
-
-
38149070897
-
Analysis of the sms4 block cipher
-
Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. Springer, Heidelberg
-
Liu, F., Ji, W., Hu, L., Ding, J., Lv, S., Pyshkin, A., Weinmann, R.P.: Analysis of the sms4 block cipher. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 158-170. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4586
, pp. 158-170
-
-
Liu, F.1
Ji, W.2
Hu, L.3
Ding, J.4
Lv, S.5
Pyshkin, A.6
Weinmann, R.P.7
-
5
-
-
38349050323
-
8)
-
Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. Springer, Heidelberg
-
8). In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 238-251. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4859
, pp. 238-251
-
-
Ji, W.1
Hu, L.2
-
6
-
-
74049150648
-
Algebraic attack to sms4 and the comparison with aes
-
Ji, W., Hu, L., Ou, H.: Algebraic attack to sms4 and the comparison with aes. In: International Symposium on Information Assurance and Security, vol. 1, pp. 662-665 (2009)
-
(2009)
International Symposium on Information Assurance and Security
, vol.1
, pp. 662-665
-
-
Ji, W.1
Hu, L.2
Ou, H.3
-
7
-
-
0031232428
-
The magma algebra system i: The user language
-
Bosma, W., Cannon, J.J., Playoust, C.: The magma algebra system i: The user language. J. Symb. Comput. 24(3/4), 235-265 (1997)
-
(1997)
J. Symb. Comput.
, vol.24
, Issue.3-4
, pp. 235-265
-
-
Bosma, W.1
Cannon, J.J.2
Playoust, C.3
-
8
-
-
77954583122
-
-
Diffie, W., Ledin, G. (translators): Cryptology ePrint Archive, Report 2008/329
-
Diffie, W., Ledin, G. (translators): Sms4 encryption algorithm for wireless networks. Cryptology ePrint Archive, Report 2008/329 (2008), http://eprint.iacr.org/
-
(2008)
Sms4 Encryption Algorithm for Wireless Networks
-
-
-
9
-
-
38149142875
-
-
Cryptology ePrint Archive, Report 2007/024
-
Bard, G.V., Courtois, N.T., Jefferson., C.: Efficient methods for conversion and solution of sparse systems of low-degree multivariate polynomials over gf(2) via sat-solvers. Cryptology ePrint Archive, Report 2007/024 (2007), http://eprint.iacr.org/
-
(2007)
Efficient Methods for Conversion and Solution of Sparse Systems of Low-degree Multivariate Polynomials over Gf(2) Via Sat-solvers
-
-
Bard, G.V.1
Courtois, N.T.2
Jefferson, C.3
-
10
-
-
33646807471
-
An analysis of the xsl algorithm
-
Roy, B. (ed.) ASIACRYPT 2005. Springer, Heidelberg
-
Cid, C., Leurent, G.: An analysis of the xsl algorithm. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 333-352. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 333-352
-
-
Cid, C.1
Leurent, G.2
-
11
-
-
33646811417
-
On asymptotic security estimates in xl and gröbner bases-related algebraic cryptanalysis
-
López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. Springer, Heidelberg
-
Yang, B.Y., Chen, J.M., Courtois, N.: On asymptotic security estimates in xl and gröbner bases-related algebraic cryptanalysis. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 401-413. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3269
, pp. 401-413
-
-
Yang, B.Y.1
Chen, J.M.2
Courtois, N.3
-
12
-
-
35048863447
-
Comparison between XL and gróbner basis algorithms
-
Lee, P.J. (ed.) ASIACRYPT 2004. Springer, Heidelberg
-
Ars, G., Faugère, J.C., Imai, H., Kawazoe, M., Sugita, M.: Comparison between XL and gróbner basis algorithms. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 354-371. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3329
, pp. 354-371
-
-
Ars, G.1
Faugère, J.C.2
Imai, H.3
Kawazoe, M.4
Sugita, M.5
|