-
2
-
-
77952237451
-
Algebraic Techniques in Differential Cryptanalysis
-
April
-
Albrecht, M., Cid, C.: Algebraic Techniques in Differential Cryptanalysis. In: Proceedings of the First International Conference on Symbolic Computation and Cryptography, SCC 2008, Beijing, China (April 2008)
-
(2008)
Proceedings of the First International Conference on Symbolic Computation and Cryptography, SCC 2008, Beijing, China
-
-
Albrecht, M.1
Cid, C.2
-
3
-
-
35048863447
-
Comparison between XL and Gröbner Basis Algorithms
-
Lee, P.J. (ed.) ASIACRYPT 2004. Springer, Heidelberg
-
Ars, G., Faugère, J.-C., Imai, H., Kawazoe, M., Sugita, M.: Comparison Between XL and Gröbner Basis Algorithms. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 338-353. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3329
, pp. 338-353
-
-
Ars, G.1
Faugère, J.-C.2
Imai, H.3
Kawazoe, M.4
Sugita, M.5
-
6
-
-
33746062308
-
On the Complexity of Gröbner Basis Computation of Semi-Regular Overdetermined Algebraic Equations
-
Bardet, M., Faugère, J.-C., Salvy, B.: On the Complexity of Gröbner Basis Computation of Semi-Regular Overdetermined Algebraic Equations. In: Proc. of International Conference on Polynomial System Solving (ICPSS), pp. 71-75 (2004)
-
(2004)
Proc. of International Conference on Polynomial System Solving (ICPSS)
, pp. 71-75
-
-
Bardet, M.1
Faugère, J.-C.2
Salvy, B.3
-
7
-
-
45449085776
-
Asymptotic Behaviour of the Degree of Regularity of Semi-Regular Polynomial Systems
-
Bardet, M., Faugère, J.-C., Salvy, B., Yang, B.-Y.: Asymptotic Behaviour of the Degree of Regularity of Semi-Regular Polynomial Systems. In: Proc. of MEGA 2005, Eighth Inter. Symposium on Effective Methods in Algebraic Geometry (2005)
-
(2005)
Proc. of MEGA 2005, Eighth Inter. Symposium on Effective Methods in Algebraic Geometry
-
-
Bardet, M.1
Faugère, J.-C.2
Salvy, B.3
Yang, B.-Y.4
-
8
-
-
84903595110
-
Differential Cryptanalysis of DES-like Cryptosystems
-
Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. Springer, Heidelberg
-
Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2-21. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.537
, pp. 2-21
-
-
Biham, E.1
Shamir, A.2
-
9
-
-
84957677472
-
Differential Cryptanalysis of of the Full 16-round DES
-
Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
-
Biham, E., Shamir, A.: Differential Cryptanalysis of of the Full 16-round DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 487-496. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 487-496
-
-
Biham, E.1
Shamir, A.2
-
10
-
-
33646925446
-
Ein algorithmisches Kriterium fur die Lösbarkeit eines algebraischen Gleichungssystems
-
Buchberger, B.: Ein algorithmisches Kriterium fur die Lösbarkeit eines algebraischen Gleichungssystems (An Algorithmical Criterion for the Solvability of Algebraic Systems of Equations). Aequationes mathematicae 4(3), 374-383 (1970);
-
(1970)
Aequationes Mathematicae
, vol.4
, Issue.3
, pp. 374-383
-
-
Buchberger, B.1
-
11
-
-
0042243811
-
Grobner Bases and Applications
-
English translation in: Proceedings of the International Conference 33 Years of Gröbner Bases, RISC, Austria. London Mathematical Society, Cambridge University Press
-
English translation in: Buchberger, B., Winkler, F. (eds.) Grobner Bases and Applications. In: Proceedings of the International Conference 33 Years of Gröbner Bases, RISC, Austria. Lecture Note Series, vol. 251, pp. 535-545. London Mathematical Society, Cambridge University Press (1998)
-
(1998)
Lecture Note Series
, vol.251
, pp. 535-545
-
-
Buchberger, B.1
Winkler, F.2
-
12
-
-
33745654751
-
Block Ciphers Sensitive to Gröbner Basis Attacks
-
Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
-
Buchmann, J., Pyshkin, A., Weinmann, R.-P.: Block Ciphers Sensitive to Gröbner Basis Attacks. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 313-331. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3860
, pp. 313-331
-
-
Buchmann, J.1
Pyshkin, A.2
Weinmann, R.-P.3
-
14
-
-
33746684290
-
A Zero-Dimensional Gröbner Basis for AES-128
-
Robshaw, M.J.B. (ed.) FSE 2006. Springer, Heidelberg
-
Buchmann, J., Pyshkin, A., Weinmann, R.-P.: A Zero-Dimensional Gröbner Basis for AES-128. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 78-88. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4047
, pp. 78-88
-
-
Buchmann, J.1
Pyshkin, A.2
Weinmann, R.-P.3
-
15
-
-
84958765510
-
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
-
Zheng, Y. (ed.) ASIACRYPT 2002. Springer, Heidelberg
-
Courtois, N., Pieprzyk, J.: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 267-287. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 267-287
-
-
Courtois, N.1
Pieprzyk, J.2
-
16
-
-
35248820612
-
Algebraic Attacks on Stream Ciphers with Linear Feedback
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
Courtois, N., Meier, W.: Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345-359. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 345-359
-
-
Courtois, N.1
Meier, W.2
-
17
-
-
35248849880
-
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Courtois, N.: Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 176-194. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 176-194
-
-
Courtois, N.1
-
18
-
-
26444546862
-
Small Scale Variants of the AES
-
Gilbert, H., Handschuh, H. (eds.) FSE 2005. Springer, Heidelberg
-
Cid, C., Murphy, S., Robshaw, M.J.B.: Small Scale Variants of the AES. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 145-162. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3557
, pp. 145-162
-
-
Cid, C.1
Murphy, S.2
Robshaw, M.J.B.3
-
19
-
-
84895289942
-
-
Springer, Heidelberg
-
Cid, C., Murphy, S., Robshaw, M.J.B.: Algebraic Aspects of the Advanced Encryption Standard. Springer, Heidelberg (2006)
-
(2006)
Algebraic Aspects of the Advanced Encryption Standard
-
-
Cid, C.1
Murphy, S.2
Robshaw, M.J.B.3
-
20
-
-
78650203514
-
Algebraic Cryptanalysis of Symmetric Primitives
-
Cid, C., Albrecht, M., Augot, D., Canteaut, A.,Weinmann, R.-P.: Algebraic Cryptanalysis of Symmetric Primitives. In: Deliverable STVL, ECRYPT - European Network of Excellence Collaborations (July 2008), http://hal.archives-ouvertes. fr/docs/00/32/86/26/PDF/D-STVL-7.pdf
-
Deliverable STVL, ECRYPT - European Network of Excellence Collaborations (July 2008)
-
-
Cid, C.1
Albrecht, M.2
Augot, D.3
Canteaut, A.4
Weinmann, R.-P.5
-
21
-
-
33646807471
-
An Analysis of the XSL Algorithm
-
Roy, B. (ed.) ASIACRYPT 2005. Springer, Heidelberg
-
Cid, C., Leurent, G.: An Analysis of the XSL Algorithm. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 333-352. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 333-352
-
-
Cid, C.1
Leurent, G.2
-
22
-
-
0003908675
-
Ideals, Varieties, and algorithms: An Introduction to Computational Algebraic Geometry and Commutative algebra
-
Springer, New York
-
Cox, D.A., Little, J.B., O'Shea, D.: Ideals, Varieties, and algorithms: an Introduction to Computational Algebraic Geometry and Commutative algebra. In: Undergraduate Texts in Mathematics. Springer, New York (1992)
-
(1992)
Undergraduate Texts in Mathematics
-
-
Cox, D.A.1
Little, J.B.2
O'Shea, D.3
-
23
-
-
25944479355
-
Efficient Computation of Zero- Dimensional Gröbner Bases by Change of Ordering
-
Faugère, J.C., Gianni, P., Lazard, D., Mora, T.: Efficient Computation of Zero- Dimensional Gröbner Bases by Change of Ordering. Journal of Symbolic Computation 16(4), 329-344 (1993)
-
(1993)
Journal of Symbolic Computation
, vol.16
, Issue.4
, pp. 329-344
-
-
Faugère, J.C.1
Gianni, P.2
Lazard, D.3
Mora, T.4
-
26
-
-
35248840150
-
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems using Gröbner bases
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Faugère, J.-C., Joux, A.: Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems using Gröbner bases. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 44-60. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 44-60
-
-
Faugère, J.-C.1
Joux, A.2
-
27
-
-
33746050364
-
Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects. Vaudenay, S. (ed.) EUROCRYPT 2006
-
Springer, Heidelberg
-
Faugère, J.-C., Perret, L.: Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 30-47. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 30-47
-
-
Faugère, J.-C.1
Perret, L.2
-
28
-
-
33749567193
-
- Schemes
-
Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
-
- Schemes. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 357-372. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 357-372
-
-
Faugère, J.-C.1
Perret, L.2
-
29
-
-
51849145057
-
Cryptanalysis of MinRank
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Faugère, J.-C., Levy-dit-Vehel, F., Perret, L.: Cryptanalysis of MinRank. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 280-296. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 280-296
-
-
Faugère, J.-C.1
Levy-dit-Vehel, F.2
Perret, L.3
-
31
-
-
84948949623
-
Truncated and Higher Order di fferentials
-
Preneel, B. (ed.) FSE 1994. Springer, Heidelberg
-
Knudsen, L.R.: Truncated and Higher Order Di fferentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 196-211. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.1008
, pp. 196-211
-
-
Knudsen, L.R.1
-
32
-
-
0041863249
-
Higher Order Derivatives and Differential Cryptanalysis
-
Kluwer Academic Publishers, Dordrecht
-
Lai, X.: Higher Order Derivatives and Differential Cryptanalysis. In: Communications and Cryptography, pp. 227-233. Kluwer Academic Publishers, Dordrecht (1994)
-
(1994)
Communications and Cryptography
, pp. 227-233
-
-
Lai, X.1
-
33
-
-
38149135204
-
An Analysis of XSL Applied to BES
-
Biryukov, A. (ed.) FSE 2007. Springer, Heidelberg
-
Lim, C.-W., Khoo, K.: An Analysis of XSL Applied to BES. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 242-253. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4593
, pp. 242-253
-
-
Lim, C.-W.1
Khoo, K.2
-
34
-
-
85025704284
-
Linear Cryptanalysis Method for des Cipher
-
Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
-
Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386-397. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 386-397
-
-
Matsui, M.1
|