-
5
-
-
33746077698
-
QUAD: a Practical Stream Cipher with Provable Security
-
Serge Vaudenay, editor, Springer-Verlag
-
Côme Berbain, Henri Gilbert, and Jacques Patarin. QUAD: a Practical Stream Cipher with Provable Security. In Serge Vaudenay, editor, Advances in Cryptology – EUROCRYPT 2006, Lecture Notes in Computer Science. Springer-Verlag, 2006.
-
(2006)
Advances in Cryptology – EUROCRYPT 2006, Lecture Notes in Computer Science
-
-
Berbain, Côme1
Gilbert, Henri2
Patarin, Jacques3
-
6
-
-
0022716288
-
A simple unpredictable pseudorandom number generator
-
Lenore Blum, Manuel Blum, and Mike Shub. A simple unpredictable pseudorandom number generator. SIAM J. Comput., 15(2):364–383, 1986.
-
(1986)
SIAM J. Comput
, vol.15
, Issue.2
, pp. 364-383
-
-
Blum, Lenore1
Blum, Manuel2
Shub, Mike3
-
7
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
Manuel Blum and Silvio Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput., 13(4):850–864, 1984.
-
(1984)
SIAM J. Comput
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, Manuel1
Micali, Silvio2
-
9
-
-
56349117175
-
-
eSTREAM, ECRYPT Stream Cipher Project, Report 2005/001
-
Christophe De Cannière and Bart Preneel. Trivium: Specifications. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/001, 2005. Available at http://www.ecrypt.eu.org/stream.
-
(2005)
Trivium: Specifications
-
-
De Cannière, Christophe1
Preneel, Bart2
-
10
-
-
84958969583
-
Solving underdefined systems of multivariate quadratic equations
-
Nicolas Courtois, Louis Goubin, Willi Meier, and Jean-Daniel Tacier. Solving underdefined systems of multivariate quadratic equations. In Public Key Cryptography, pages 211–227, 2002.
-
(2002)
Public Key Cryptography
, pp. 211-227
-
-
Courtois, Nicolas1
Goubin, Louis2
Meier, Willi3
Tacier, Jean-Daniel4
-
11
-
-
77649327985
-
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
-
Bart Preneel, editor, pages Springer-Verlag
-
Nicolas Courtois, Alexander Klimov, Jacques Patarin, and Adi Shamir. Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In Bart Preneel, editor, Advances in Cryptology – EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, pages 392–407. Springer-Verlag, 2000.
-
(2000)
Advances in Cryptology – EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science
, pp. 392-407
-
-
Courtois, Nicolas1
Klimov, Alexander2
Patarin, Jacques3
Shamir, Adi4
-
12
-
-
35248834096
-
About the XL Algorithm over GF(2)
-
Marc Joye, editor, pages Springer-Verlag
-
Nicolas Courtois and Jacques Patarin. About the XL Algorithm over GF(2). In Marc Joye, editor, Topics in Cryptology – CT-RSA 2003, volume 2612 of Lecture Notes in Computer Science, pages 141–157. Springer-Verlag, 2003.
-
(2003)
Topics in Cryptology – CT-RSA 2003, volume 2612 of Lecture Notes in Computer Science
, pp. 141-157
-
-
Courtois, Nicolas1
Patarin, Jacques2
-
15
-
-
85175084642
-
Comparison Between XL and Grbner Basis Algorithms
-
Pil Joong Lee, editor, pages Springer-Verlag
-
Jean-Charles Faugère, Hideki Imai, Mitsuru Kawazoe, Makoto Sugita, and Gwénolé Ars. Comparison Between XL and Grbner Basis Algorithms. In Pil Joong Lee, editor, Advances in Cryptology – ASIACRYPT 2004, volume 3329 of Lecture Notes in Computer Science, pages 338–353. Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology – ASIACRYPT 2004, volume 3329 of Lecture Notes in Computer Science
, pp. 338-353
-
-
Faugère, Jean-Charles1
Imai, Hideki2
Kawazoe, Mitsuru3
Sugita, Makoto4
Ars, Gwénolé5
-
16
-
-
84947905764
-
An efficient pseudo-random generator provably as secure as syndrome decoding
-
Jean-Bernard Fischer and Jacques Stern. An efficient pseudo-random generator provably as secure as syndrome decoding. In EUROCRYPT, pages 245–255, 1996.
-
(1996)
EUROCRYPT
, pp. 245-255
-
-
Fischer, Jean-Bernard1
Stern, Jacques2
-
17
-
-
0009033784
-
Complexity of solving algebraic equations
-
(/5)
-
Aviezri S. Fraenkel and Yaacov Yesha. Complexity of solving algebraic equations. Inf. Process. Lett., 10(4/5):178–179, 1980.
-
(1980)
Inf. Process. Lett
, vol.10
, Issue.4
, pp. 178-179
-
-
Fraenkel, Aviezri S.1
Yesha, Yaacov2
-
20
-
-
0022793132
-
How to Construct Random Functions
-
Oded Goldreich, Shafi Goldwasser, and Silvio Micali. How to Construct Random Functions. J. ACM, 33(4):792–807, 1986.
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, Oded1
Goldwasser, Shafi2
Micali, Silvio3
-
23
-
-
84949426591
-
Scream: A software-efficient stream cipher
-
Joan Daemen and Vincent Rijmen, editors, pages
-
Shai Halevi, Don Coppersmith, and Charanjit S. Jutla. Scream: A software-efficient stream cipher. In Joan Daemen and Vincent Rijmen, editors, Proceedings of Fast Software Encryption – FSE’02, number 2365, pages 195–209, 2002.
-
(2002)
Proceedings of Fast Software Encryption – FSE’02
, vol.2365
, pp. 195-209
-
-
Halevi, Shai1
Coppersmith, Don2
Jutla, Charanjit S.3
-
24
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
Johan Håstad, Russell Impagliazzo, Leonid A. Levin, and Michael Luby. A pseudorandom generator from any one-way function. SIAM J. Comput., 28(4):1364–1396, 1999.
-
(1999)
SIAM J. Comput
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, Johan1
Impagliazzo, Russell2
Levin, Leonid A.3
Luby, Michael4
-
26
-
-
34547693749
-
Grain - A Stream Cipher for Constrained Environments
-
ECRYPT Stream Cipher Project Report 2005/001
-
M. Hell, T. Johansson, and W. Meier. Grain - A Stream Cipher for Constrained Environments. ECRYPT Stream Cipher Project Report 2005/001, 2005. http://www.ecrypt.eu.org/stream.
-
(2005)
-
-
Hell, M.1
Johansson, T.2
Meier, W.3
-
27
-
-
0001143795
-
Efficient cryptographic schemes provably as secure as subset sum
-
Russell Impagliazzo and Moni Naor. Efficient cryptographic schemes provably as secure as subset sum. J. Cryptology, 9(4):199–216, 1996.
-
(1996)
J. Cryptology
, vol.9
, Issue.4
, pp. 199-216
-
-
Impagliazzo, Russell1
Naor, Moni2
-
29
-
-
0342430954
-
Asymmetric cryptography with s-boxes
-
Jacques Patarin and Louis Goubin. Asymmetric cryptography with s-boxes. In ICICS, pages 369–380, 1997.
-
(1997)
ICICS
, pp. 369-380
-
-
Patarin, Jacques1
Goubin, Louis2
-
31
-
-
84976667857
-
On the Generation of Cryptographically Strong Pseudo-Random Sequences
-
Adi Shamir. On the Generation of Cryptographically Strong Pseudo-Random Sequences. In ICALP, pages 544–550, 1981.
-
(1981)
ICALP
, pp. 544-550
-
-
Shamir, Adi1
-
32
-
-
56749098583
-
On the provable security of an efficient rsa-based pseudorandom generator
-
Ron Steinfeld, Josef Pieprzyk, and Huaxiong Wang. On the provable security of an efficient rsa-based pseudorandom generator. In ASIACRYPT, pages 194–209, 2006.
-
(2006)
ASIACRYPT
, pp. 194-209
-
-
Steinfeld, Ron1
Pieprzyk, Josef2
Wang, Huaxiong3
|