-
1
-
-
84895301822
-
-
BOINC: Berkeley open infrastructure for networked computing
-
BOINC: Berkeley open infrastructure for networked computing. Available at http://boinc.berkeley.edu/
-
-
-
-
2
-
-
84895372998
-
-
Magma. Software Package
-
Magma. Software Package. Available at http://magma.maths.usyd.edu.au/ magma/
-
-
-
-
3
-
-
84895265111
-
-
Maple. Software Package
-
Maple. Software Package. Available at http://www.maplesoft.com/
-
-
-
-
4
-
-
84895394569
-
-
Mathematica. Software Package
-
Mathematica. Software Package. Available at http://www.wolfram.com/ products/mathematica/index.html
-
-
-
-
5
-
-
84895329661
-
-
Matlab. Software Package
-
Matlab. Software Package. Available at http://www.mathworks.com/
-
-
-
-
6
-
-
84895214709
-
-
MiniSAT. Software Package http://minisat.se/Papers.html
-
MiniSAT. Software Package. Available at http://www.cs.chalmers.se/Cs/ Research/FormalMethods/MiniSat/or http://minisat.se/Papers. html
-
-
-
-
7
-
-
84895205841
-
-
Sage. Software Package
-
Sage. Software Package. Available at http://www.sagemath.org/
-
-
-
-
8
-
-
84895357012
-
-
SETI@home classic. See
-
SETI@home classic. See http://setiathome.berkeley.edu/classic.php
-
-
-
-
9
-
-
84895340171
-
-
Singular. Software Package
-
Singular. Software Package. Available at http://www.singular.uni-kl.de/
-
-
-
-
10
-
-
0038256558
-
-
Specification for the Advanced Encryption Standard Tech. rep., National Institute of Standards and Technology (NIST)
-
Specification for the Advanced Encryption Standard: Federal information processing standards publication 197 (FIPS-197). Tech. rep., National Institute of Standards and Technology (NIST) ( 2001)
-
(2001)
Federal Information Processing Standards Publication 197 (FIPS-197)
-
-
-
11
-
-
67650739305
-
Breaking RSA generically is equivalent to factoring
-
A. Joux (ed.) Springer-Verlag
-
Aggarwal, D., Maurer, U.: Breaking RSA generically is equivalent to factoring. In: A. Joux (ed.) Advances in Cryptology-Proc. of EUROCRYPT, Lecture Notes in Computer Science, vol. 5479, pp. 36-53. Springer-Verlag (2009)
-
(2009)
Advances in Cryptology-Proc. of EUROCRYPT, Lecture Notes in Computer Science
, vol.5479
, pp. 36-53
-
-
Aggarwal, D.1
Maurer, U.2
-
13
-
-
67349254345
-
-
Master's thesis, University of Bremen (Universität Bremen), Department of Computer Science
-
Albrecht, M.: Algebraic attacks on the courtois toy cipher. Master's thesis, University of Bremen (Universität Bremen), Department of Computer Science (2006)
-
(2006)
Algebraic Attacks on the Courtois Toy Cipher
-
-
Albrecht, M.1
-
16
-
-
77952575089
-
An introduction to simulated annealing
-
Albright, B.: An introduction to simulated annealing. College Mathematics Journal 38(1), 37-42 (2007)
-
(2007)
College Mathematics Journal
, vol.38
, Issue.1
, pp. 37-42
-
-
Albright, B.1
-
17
-
-
0001934611
-
Irrationalité de ζ(2) et ζ(3)
-
Apéry, R.: Irrationalité de ζ(2) et ζ(3). Astérisque 61, 11-13 (1979)
-
(1979)
Astérisque
, vol.61
, pp. 11-13
-
-
Apéry, R.1
-
18
-
-
34748848692
-
Compact FPGA implementations of QUAD
-
F. Bao, S. Miller (eds.) ACM
-
Arditti, D., Berbain, C., Billet, O., Gilbert, H.: Compact FPGA implementations of QUAD. In: F. Bao, S. Miller (eds.) Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, (ASIACCS'07), pp. 347-349. ACM (2007)
-
(2007)
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, (ASIACCS'07)
, pp. 347-349
-
-
Arditti, D.1
Berbain, C.2
Billet, O.3
Gilbert, H.4
-
19
-
-
84895203722
-
QUAD: Overview and recent developments
-
E. Biham, H. Handschuh, S. Lucks, V. Rijmen (eds.) 07021, Schloss Dagstuhl, Germany
-
Arditti, D., Berbain, C., Billet, O., Gilbert, H., Patarin, J.: QUAD: Overview and recent developments. In: E. Biham, H. Handschuh, S. Lucks, V. Rijmen (eds.) Symmetric Cryptography, Dagstuhl Seminar Proceedings, vol. 07021. Internationales Begegnungs-und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany (2007)
-
(2007)
Symmetric Cryptography, Dagstuhl Seminar Proceedings. Internationales Begegnungs-und Forschungszentrum fuer Informatik (IBFI)
-
-
Arditti, D.1
Berbain, C.2
Billet, O.3
Gilbert, H.4
Patarin, J.5
-
20
-
-
0001530092
-
On economical construction of the transitive closure of a directed graph
-
(in Russian), English Translation in Soviet Math Dokl
-
Arlazarov, V., Dinic, E., Kronrod, M., Faradzev, I.: On economical construction of the transitive closure of a directed graph. Dokl. Akad. Nauk. SSSR 194(11) (1970). (in Russian), English Translation in Soviet Math Dokl
-
(1970)
Dokl. Akad. Nauk. SSSR
, vol.194
, Issue.11
-
-
Arlazarov, V.1
Dinic, E.2
Kronrod, M.3
Faradzev, I.4
-
22
-
-
35048861887
-
Improving fast algebraic attacks
-
B.K. Roy, W. Meier (eds.) Springer-Verlag
-
Armknecht, F.: Improving fast algebraic attacks. In: B.K. Roy, W. Meier (eds.) Proc. of Fast Software Encryption (FSE'04), Lecture Notes in Computer Science, vol. 3017, pp. 65-82. Springer-Verlag (2004)
-
(2004)
Proc. of Fast Software Encryption (FSE'04), Lecture Notes in Computer Science
, vol.3017
, pp. 65-82
-
-
Armknecht, F.1
-
23
-
-
33646184984
-
Introducing a new variant of fast algebraic attacks and minimizing their successive data complexity
-
E. Dawson, S. Vaudenay (eds.) Springer-Verlag
-
Armknecht, F., Ars, G.: Introducing a new variant of fast algebraic attacks and minimizing their successive data complexity. In: E. Dawson, S. Vaudenay (eds.) Proc. of Mycrypt, Lecture Notes in Computer Science, vol. 3715, pp. 16-32. Springer-Verlag (2005)
-
(2005)
Proc. of Mycrypt, Lecture Notes in Computer Science
, vol.3715
, pp. 16-32
-
-
Armknecht, F.1
Ars, G.2
-
24
-
-
35248840147
-
Algebraic attacks on combiners with memory
-
D. Boneh (ed.) Springer-Verlag
-
Armknecht, F., Krause, M.: Algebraic attacks on combiners with memory. In: D. Boneh (ed.) Advances in Cryptology-Proc. of CRYPTO, Lecture Notes in Computer Science, vol. 2729, pp. 162-175. Springer-Verlag (2003)
-
(2003)
Advances in Cryptology-Proc. of CRYPTO, Lecture Notes in Computer Science
, vol.2729
, pp. 162-175
-
-
Armknecht, F.1
Krause, M.2
-
25
-
-
35048863447
-
Comparison between XL and Gröbner Basis algorithms
-
P.J. Lee (ed.) Springer-Verlag
-
Ars, G., Faugère, J.C., Imai, H., Kawazoe, M., Sugita, M.: Comparison between XL and Gröbner Basis algorithms. In: P.J. Lee (ed.) Advances in Cryptology-Proc. of ASIACRYPT, Lecture Notes in Computer Science, vol. 3329, pp. 338-353. Springer-Verlag (2004)
-
(2004)
Advances in Cryptology-Proc. of ASIACRYPT, Lecture Notes in Computer Science
, vol.3329
, pp. 338-353
-
-
Ars, G.1
Faugère, J.C.2
Imai, H.3
Kawazoe, M.4
Sugita, M.5
-
26
-
-
0013502267
-
The magic words are squeamish os-sifrage
-
J. Pieprzyk, R. Safavi-Naini (eds.) Springer-Verlag
-
Atkins, D., Graff, M., Lenstra, A.K., Leyland, P.C.: The magic words are squeamish os-sifrage. In: J. Pieprzyk, R. Safavi-Naini (eds.) Advances in Cryptology-Proc. of ASI-ACRYPT, Lecture Notes in Computer Science, vol. 917, pp. 263-277. Springer-Verlag (1994)
-
(1994)
Advances in Cryptology-Proc. of ASI-ACRYPT, Lecture Notes in Computer Science
, vol.917
, pp. 263-277
-
-
Atkins, D.1
Graff, M.2
Lenstra, A.K.3
Leyland, P.C.4
-
28
-
-
84895360690
-
-
Tech. rep., University of Maryland, Applied Mathematics and Scientific Computation Program Scholarly Paper for M.Sc. in Applied Math, available on the author's web-page
-
Bard, G.: Algorithms for fast matrix operations. Tech. rep., University of Maryland, Applied Mathematics and Scientific Computation Program (2005). Scholarly Paper for M.Sc. in Applied Math, available on the author's web-page
-
(2005)
Algorithms for Fast Matrix Operations
-
-
Bard, G.1
-
31
-
-
84895409255
-
Extending SAT-Solvers to low-degree extension fields of GF(2)
-
Bard, G.: Extending SAT-Solvers to low-degree extension fields of GF(2). Presented at the Central European Conference on Cryptography (2008). Available at http://www.math. umd.edu/bardg/extension-fields.pdf
-
(2008)
Presented at the Central European Conference on Cryptography
-
-
Bard, G.1
-
32
-
-
38149142875
-
-
Cryptology ePrint Archive, Report 2007/024
-
Bard, G., Courtois, N., Jefferson, C.: Efficient methods for conversion and solution of sparse systems of low-degree multivariate polynomials over GF(2) via SAT-Solvers. Cryptology ePrint Archive, Report 2007/024 (2006). Available at http://eprint.iacr.org/2007/024.pdf
-
(2006)
Efficient Methods for Conversion and Solution of Sparse Systems of Low-degree Multivariate Polynomials over GF(2) Via SAT-Solvers
-
-
Bard, G.1
Courtois, N.2
Jefferson, C.3
-
34
-
-
77954095439
-
A challenging but feasible blockwise-adaptive chosen-plaintext attack on SSL
-
M. Malek, E. Fernández-Medina, J. Hernando (eds.) INSTICC Press
-
Bard, G.V.: A challenging but feasible blockwise-adaptive chosen-plaintext attack on SSL. In: M. Malek, E. Fernández-Medina, J. Hernando (eds.) Proceedings of the International Conference on Security and Cryptography (SECRYPT'06), pp. 99-109. INSTICC Press (2006). Available at http://eprint.iacr.org/2006/136/
-
(2006)
Proceedings of the International Conference on Security and Cryptography (SECRYPT'06)
, pp. 99-109
-
-
Bard, G.V.1
-
35
-
-
35248861711
-
Instant ciphertext-only cryptanalysis of GSM Encrypted communication
-
D. Boneh (ed.) Springer-Verlag
-
Barkan, E., Biham, E., Keller, N.: Instant ciphertext-only cryptanalysis of GSM Encrypted communication. In: D. Boneh (ed.) Advances in Cryptology-Proc. of CRYPTO, Lecture Notes in Computer Science, vol. 2729, pp. 600-616. Springer-Verlag (2003)
-
(2003)
Advances in Cryptology-Proc. of CRYPTO, Lecture Notes in Computer Science
, vol.2729
, pp. 600-616
-
-
Barkan, E.1
Biham, E.2
Keller, N.3
-
36
-
-
0000239575
-
Why you cannot even hope to use Gröbner bases in public-key cryptography-an open letter to a scientist who failed and a challenge to those who have not yet failed
-
Barkee, B., Can, D.C., Ecks, J., Moriarty, T., Ree, R.F.: Why you cannot even hope to use Gröbner bases in public-key cryptography-an open letter to a scientist who failed and a challenge to those who have not yet failed. Journal of Symbolic Computations 18(6), 497-501 (1994)
-
(1994)
Journal of Symbolic Computations
, vol.18
, Issue.6
, pp. 497-501
-
-
Barkee, B.1
Can, D.C.2
Ecks, J.3
Moriarty, T.4
Ree, R.F.5
-
39
-
-
0031351741
-
A concrete security treatment of symmetric encryption: Analysis of the des modes of operation
-
IEEE
-
Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation. In: Proc. 38th Symposium on Foundations of Computer Science. IEEE (1997)
-
(1997)
Proc. 38th Symposium on Foundations of Computer Science
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
40
-
-
0347038905
-
An approximate probabilistic model for structured Gaussian Elimination
-
Bender, E., Canfield, E.R.: An approximate probabilistic model for structured Gaussian Elimination. The Journal of Algorithms (1999)
-
(1999)
The Journal of Algorithms
-
-
Bender, E.1
Canfield, E.R.2
-
41
-
-
33746077698
-
QUAD: A practical stream cipher with provable security
-
S. Vaudenay (ed.) Springer-Verlag
-
Berbain, C., Gilbert, H., Patarin, J.: QUAD: A practical stream cipher with provable security. In: S. Vaudenay (ed.) Advances in Cryptology-Proc. of EUROCRYPT, Lecture Notes in Computer Science, vol. 4004, pp. 109-128. Springer-Verlag (2006)
-
(2006)
Advances in Cryptology-Proc. of EUROCRYPT, Lecture Notes in Computer Science
, vol.4004
, pp. 109-128
-
-
Berbain, C.1
Gilbert, H.2
Patarin, J.3
-
44
-
-
67650679679
-
ECM on graphics cards
-
A. Joux (ed.) Springer-Verlag
-
Bernstein, D., Chen, T.R., Cheng, C.M., Lange, T., Yang, B.Y.: ECM on graphics cards. In: A. Joux (ed.) Advances in Cryptology-Proc. of EUROCRYPT, Lecture Notes in Computer Science, vol. 5479, pp. 483-501. Springer-Verlag (2009)
-
(2009)
Advances in Cryptology-Proc. of EUROCRYPT, Lecture Notes in Computer Science
, vol.5479
, pp. 483-501
-
-
Bernstein, D.1
Chen, T.R.2
Cheng, C.M.3
Lange, T.4
Yang, B.Y.5
-
45
-
-
38049002769
-
Special volume on the SAT 2005 competitions and evaluations
-
Berre, D.L., Simon, L.: Special volume on the SAT 2005 competitions and evaluations. Journal of Satisfiability (2006)
-
(2006)
Journal of Satisfiability
-
-
Berre, D.L.1
Simon, L.2
-
46
-
-
84857697689
-
-
Biham, E., Dunkelman, O., Indesteege, S., Keller, N., Preneel, B.: How to steal cars-a practical attack on Keeloq (2008)
-
(2008)
How to Steal Cars - A Practical Attack on Keeloq
-
-
Biham, E.1
Dunkelman, O.2
Indesteege, S.3
Keller, N.4
Preneel, B.5
-
47
-
-
84974707207
-
Real time cryptanalysis of A5/1 on a PC
-
B. Schneier (ed.) Springer-Verlag
-
Biryukov, A., Shamir, A., Wagner, D.: Real time cryptanalysis of A5/1 on a PC. In: B. Schneier (ed.) Fast Software Encryption (FSE'00), Lecture Notes in Computer Science, vol. 1978, pp. 1-18. Springer-Verlag (2000)
-
(2000)
Fast Software Encryption (FSE'00), Lecture Notes in Computer Science
, vol.1978
, pp. 1-18
-
-
Biryukov, A.1
Shamir, A.2
Wagner, D.3
-
49
-
-
84855445766
-
-
Cryptology ePrint Archive, Report 2007/055
-
Bogdanov, A.: Cryptanalysis of the Keeloq block cipher. Cryptology ePrint Archive, Report 2007/055 (2007). Available at http://eprint.iacr.org/2007/055/
-
(2007)
Cryptanalysis of the Keeloq Block Cipher
-
-
Bogdanov, A.1
-
50
-
-
54249143639
-
Linear slide attacks on the Keeloq block cipher
-
D. Pei, M. Yung, D. Lin, C. Wu (eds.) Springer-Verlag
-
Bogdanov, A.: Linear slide attacks on the Keeloq block cipher. In: D. Pei, M. Yung, D. Lin, C. Wu (eds.) INSCRYPT'07, Lecture Notes in Computer Science, vol. 4990, pp. 66-80. Springer-Verlag (2007)
-
(2007)
INSCRYPT'07, Lecture Notes in Computer Science
, vol.4990
, pp. 66-80
-
-
Bogdanov, A.1
-
51
-
-
0017216776
-
Testing for the consecutive ones property, interval graphs, and graph planarity using PQ-tree algorithms
-
Booth, K.S., Lueker, G.S.: Testing for the consecutive ones property, interval graphs, and graph planarity using PQ-tree algorithms. J. Comput. Systems Sci. 13, 335-379 (1976)
-
(1976)
J. Comput. Systems Sci.
, vol.13
, pp. 335-379
-
-
Booth, K.S.1
Lueker, G.S.2
-
54
-
-
84968505384
-
Triangular factorization and inversion by fast matrix multiplication
-
Bunch, J., Hopcroft, J.: Triangular factorization and inversion by fast matrix multiplication. Math Comp. 28(125) (1974)
-
(1974)
Math Comp.
, vol.28
, Issue.125
-
-
Bunch, J.1
Hopcroft, J.2
-
55
-
-
33750241980
-
Trivium: A stream cipher construction inspired by block cipher design principles
-
S.K. Katsikas, J. Lopez, M. Backes, S. Gritzalis, B. Preneel (eds.) Springer-Verlag
-
Cannière, C.D.: Trivium: A stream cipher construction inspired by block cipher design principles. In: S.K. Katsikas, J. Lopez, M. Backes, S. Gritzalis, B. Preneel (eds.) Proceedings of the 9th International Conference on Information Security, ISC'06, Lecture Notes in Computer Science, vol. 4176, pp. 171-186. Springer-Verlag (2006)
-
(2006)
Proceedings of the 9th International Conference on Information Security, ISC'06, Lecture Notes in Computer Science
, vol.4176
, pp. 171-186
-
-
Cannière, C.D.1
-
56
-
-
0019398205
-
Register allocation via coloring
-
Chaitin, G.J., Auslander, M.A., Chandra, A.K., Cocke, J., Hopkins, M.E., Markstein, P.W.: Register allocation via coloring. Computer Languages 6, 47-57 (1981)
-
(1981)
Computer Languages
, vol.6
, pp. 47-57
-
-
Chaitin, G.J.1
Auslander, M.A.2
Chandra, A.K.3
Cocke, J.4
Hopkins, M.E.5
Markstein, P.W.6
-
57
-
-
79960777796
-
-
Tech. Rep. D.STVL.7, ECRYPT: The European Union Network of Excellence in Cryptography
-
Cid, C., Albrecht, M., Augot, D., Canteaut, A., Weinmann, R.P.: Algebraic cryptanalysis of symmetric primitives. Tech. Rep. D.STVL.7, ECRYPT: The European Union Network of Excellence in Cryptography (2008)
-
(2008)
Algebraic Cryptanalysis of Symmetric Primitives
-
-
Cid, C.1
Albrecht, M.2
Augot, D.3
Canteaut, A.4
Weinmann, R.P.5
-
59
-
-
21144460202
-
Solving linear equations over GF(2): The Block Lanczos algorithm
-
Coppersmith, D.: Solving linear equations over GF(2): the Block Lanczos algorithm. Linear Algebra and its Applications 192, 33-60 (1993)
-
(1993)
Linear Algebra and Its Applications
, vol.192
, pp. 33-60
-
-
Coppersmith, D.1
-
60
-
-
84968521645
-
Solving homogeneous linear equations over GF(2) via Block Wiedemann algorithm
-
Coppersmith, D.: Solving homogeneous linear equations over GF(2) via Block Wiedemann algorithm. Mathematics of Computation 62(205), 333-350 (1994)
-
(1994)
Mathematics of Computation
, vol.62
, Issue.205
, pp. 333-350
-
-
Coppersmith, D.1
-
62
-
-
0004116989
-
-
second edn. MIT Press, McGraw-Hill Book Company
-
Cormen, T., Leiserson, C., Rivest, R., Stein, C.: Introduction to Algorithms, second edn. MIT Press, McGraw-Hill Book Company (2001)
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.1
Leiserson, C.2
Rivest, R.3
Stein, C.4
-
63
-
-
84895335733
-
-
MQ, MinRank, IP, HFE Ph.D. thesis, Paris VI
-
Courtois, N.: The security of cryptographic primitives based on multivariate algebraic problems: MQ, MinRank, IP, HFE. Ph.D. thesis, Paris VI (2001). Available at http://www.nicolascourtois.net/phd.pdf
-
(2001)
The Security of Cryptographic Primitives Based on Multivariate Algebraic Problems
-
-
Courtois, N.1
-
64
-
-
84937560136
-
The security of Hidden Field Equations (HFE)
-
D. Naccache (ed.) Springer-Verlag
-
Courtois, N.: The security of Hidden Field Equations (HFE). In: D. Naccache (ed.) Cryptographers' Track, RSA Conference, Lecture Notes in Computer Science, vol. 2020, pp. 266-281. Springer-Verlag (2001)
-
(2001)
Cryptographers' Track, RSA Conference, Lecture Notes in Computer Science
, vol.2020
, pp. 266-281
-
-
Courtois, N.1
-
65
-
-
35248828626
-
Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt
-
P.J. Lee, C.H. Lim (eds.) Springer-Verlag
-
Courtois, N.: Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt. In: P.J. Lee, C.H. Lim (eds.) Proc. of ICISC, Lecture Notes in Computer Science, vol. 2587, pp. 182-199. Springer-Verlag (2002)
-
(2002)
Proc. of ICISC, Lecture Notes in Computer Science
, vol.2587
, pp. 182-199
-
-
Courtois, N.1
-
66
-
-
35248849880
-
Fast algebraic attacks on stream ciphers with linear feedback
-
D. Boneh (ed.) Springer-Verlag
-
Courtois, N.: Fast algebraic attacks on stream ciphers with linear feedback. In: D. Boneh (ed.) Advances in Cryptology-Proc. of CRYPTO, Lecture Notes in Computer Science, vol. 2729, pp. 176-194. Springer-Verlag (2003)
-
(2003)
Advances in Cryptology-Proc. of CRYPTO, Lecture Notes in Computer Science
, vol.2729
, pp. 176-194
-
-
Courtois, N.1
-
68
-
-
24944457137
-
Algebraic attacks on combiners with memory and several outputs
-
C. Park, S. Chee (eds.) Springer-Verlag
-
Courtois, N.: Algebraic attacks on combiners with memory and several outputs. In: C. Park, S. Chee (eds.) Proc. of ICISC, Lecture Notes in Computer Science, vol. 3506, pp. 3-20. Springer-Verlag (2004)
-
(2004)
Proc. of ICISC, Lecture Notes in Computer Science
, vol.3506
, pp. 3-20
-
-
Courtois, N.1
-
69
-
-
35048866377
-
k), application to HFE Challenge 2 and Sflash-v2
-
F. Bao, R.H. Deng, J. Zhou (eds.) Springer-Verlag
-
k), application to HFE Challenge 2 and Sflash-v2. In: F. Bao, R.H. Deng, J. Zhou (eds.) Public Key Cryptography (PKC'04), Lecture Notes in Computer Science, vol. 2947, pp. 201-217. Springer-Verlag (2004)
-
(2004)
Public Key Cryptography (PKC'04), Lecture Notes in Computer Science
, vol.2947
, pp. 201-217
-
-
Courtois, N.1
-
70
-
-
24144472488
-
General principles of algebraic attacks and new design criteria for components of symmetric ciphers
-
H. Dobbertin, V. Rijmen, A. Sowa (eds.) Springer-Verlag
-
Courtois, N.: General principles of algebraic attacks and new design criteria for components of symmetric ciphers. In: H. Dobbertin, V. Rijmen, A. Sowa (eds.) Proc. AES 4 Conference, Lecture Notes in Computer Science, vol. 3373, pp. 67-83. Springer-Verlag (2004)
-
(2004)
Proc. AES 4 Conference, Lecture Notes in Computer Science
, vol.3373
, pp. 67-83
-
-
Courtois, N.1
-
71
-
-
78651093565
-
-
Cryptology ePrint Archive, Report 2004/143
-
Courtois, N.: Short signatures, provable security, generic attacks, and computational security of multivariate polynomial schemes such as HFE, Quartz and Sflash. Cryptology ePrint Archive, Report 2004/143 (2004). Available at http://eprint.iacr.org/2004/143
-
(2004)
Short Signatures, Provable Security, Generic Attacks, and Computational Security of Multivariate Polynomial Schemes Such As HFE, Quartz and Sflash
-
-
Courtois, N.1
-
72
-
-
85175016082
-
How fast can be algebraic attacks on block ciphers?
-
E. Biham, H. Hand-schuh, S. Lucks, V. Rijmen (eds.) 07021 Internationales Begegnungs-und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany
-
Courtois, N.: How fast can be algebraic attacks on block ciphers? In: E. Biham, H. Hand-schuh, S. Lucks, V. Rijmen (eds.) Symmetric Cryptography, Dagstuhl Seminar Proceedings, vol. 07021. Internationales Begegnungs-und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany (2007)
-
(2007)
Symmetric Cryptography, Dagstuhl Seminar Proceedings
-
-
Courtois, N.1
-
74
-
-
84895362784
-
-
Cryptology ePrint Archive, Report 2009/186
-
Courtois, N., Bard, G., Ault, S.: Statistics of random permutations and the cryptanalysis of periodic block ciphers. Cryptology ePrint Archive, Report 2009/186 (2009). Available at http://eprint.iacr.org/2009/186
-
(2009)
Statistics of Random Permutations and the Cryptanalysis of Periodic Block Ciphers
-
-
Courtois, N.1
Bard, G.2
Ault, S.3
-
75
-
-
38149068190
-
Algebraic cryptanalysis of the data encryption standard
-
S.D. Galbraith (ed.) Springer-Verlag
-
Courtois, N., Bard, G.V.: Algebraic cryptanalysis of the data encryption standard. In: S.D. Galbraith (ed.) IMA International Conference on Cryptography and Coding Theory, Lecture Notes in Computer Science, vol. 4887, pp. 152-169. Springer-Verlag (2007). Available at http://eprint.iacr.org/2006/402
-
(2007)
IMA International Conference on Cryptography and Coding Theory, Lecture Notes in Computer Science
, vol.4887
, pp. 152-169
-
-
Courtois, N.1
Bard, G.V.2
-
76
-
-
35248824029
-
On the security of HFE, HFEv-and Quartz
-
Y. Desmedt (ed.) Springer-Verlag
-
Courtois, N., Daum, M., Felke, P.: On the security of HFE, HFEv-and Quartz. In: Y. Desmedt (ed.) Public Key Cryptography (PKC'03), Lecture Notes in Computer Science, vol. 2567, pp. 337-350. Springer-Verlag (2003)
-
(2003)
Public Key Cryptography (PKC'03), Lecture Notes in Computer Science
, vol.2567
, pp. 337-350
-
-
Courtois, N.1
Daum, M.2
Felke, P.3
-
77
-
-
33645598476
-
-
Cryp-tology ePrint Archive Report 2003/211
-
Courtois, N., Goubin, L., Patarin, J.: SFLASHv3, a fast asymmetric signature scheme. Cryp-tology ePrint Archive, Report 2003/211 (2003). Available at http://eprint.iacr. org/2003/211
-
(2003)
SFLASHv3 A Fast Asymmetric Signature Scheme
-
-
Courtois, N.1
Goubin, L.2
Patarin, J.3
-
78
-
-
35248820612
-
Algebraic attacks on stream ciphers with linear feedback
-
E. Bi-ham (ed.) Springer-Verlag
-
Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: E. Bi-ham (ed.) Advances in Cryptology-Proc. of EUROCRYPT, Lecture Notes in Computer Science, vol. 2656, pp. 345-359. Springer-Verlag (2003)
-
(2003)
Advances in Cryptology-Proc. of EUROCRYPT, Lecture Notes in Computer Science
, vol.2656
, pp. 345-359
-
-
Courtois, N.1
Meier, W.2
-
79
-
-
35248834096
-
About the XL algorithm over GF(2)
-
M. Joye (ed.) Springer-Verlag
-
Courtois, N., Patarin, J.: About the XL algorithm over GF(2). In: M. Joye (ed.) Cryptographers' Track, RSA Conference, Lecture Notes in Computer Science, vol. 2612, pp. 141-157. Springer-Verlag (2003)
-
(2003)
Cryptographers' Track, RSA Conference, Lecture Notes in Computer Science
, vol.2612
, pp. 141-157
-
-
Courtois, N.1
Patarin, J.2
-
80
-
-
84958765510
-
Cryptanalysis of block ciphers with overdefined systems of equations
-
Y. Zheng (ed.) Springer-Verlag
-
Courtois, N., Pieprzyk, J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: Y. Zheng (ed.) Advances in Cryptology-Proc. of ASIACRYPT, Lecture Notes in Computer Science, vol. 2501, pp. 267-287. Springer-Verlag (2002). Available at http://eprint.iacr.org/2002/044/
-
(2002)
Advances in Cryptology-Proc. of ASIACRYPT, Lecture Notes in Computer Science
, vol.2501
, pp. 267-287
-
-
Courtois, N.1
Pieprzyk, J.2
-
81
-
-
77649327985
-
Efficient algorithms for solving overde-fined systems of multivariate polynomial equations
-
B. Preneel (ed.) Springer-Verlag
-
Courtois, N., Shamir, A., Patarin, J., Klimov, A.: Efficient algorithms for solving overde-fined systems of multivariate polynomial equations. In: B. Preneel (ed.) Advances in Cryptology-Proc. of EUROCRYPT, Lecture Notes in Computer Science, vol. 1807, pp. 392-407. Springer-Verlag (2000)
-
(2000)
Advances in Cryptology-Proc. of EUROCRYPT, Lecture Notes in Computer Science
, vol.1807
, pp. 392-407
-
-
Courtois, N.1
Shamir, A.2
Patarin, J.3
Klimov, A.4
-
82
-
-
84855416685
-
-
Tatra Mountains Mathematical Publications, Slovak Academy of Sciences
-
Courtois, N.T., Bard, G.V., Bogdanov, A.: Periodic ciphers with small blocks and cryptanal-ysis of Keeloq. Tatra Mountains Mathematical Publications, Slovak Academy of Sciences 41, 167-188 (2008)
-
(2008)
Periodic Ciphers with Small Blocks and Cryptanal-ysis of Keeloq
, vol.41
, pp. 167-188
-
-
Courtois, N.T.1
Bard, G.V.2
Bogdanov, A.3
-
83
-
-
50249137714
-
Algebraic and slide attacks on Keeloq
-
K. Nyberg (ed.) Springer-Verlag
-
Courtois, N.T., Bard, G.V., Wagner, D.: Algebraic and slide attacks on Keeloq. In: K. Nyberg (ed.) Proc. of Fast Software Encryption (FSE'08), Lecture Notes in Computer Science, vol. 5086, pp. 97-115. Springer-Verlag (2008)
-
(2008)
Proc. of Fast Software Encryption (FSE'08), Lecture Notes in Computer Science
, vol.5086
, pp. 97-115
-
-
Courtois, N.T.1
Bard, G.V.2
Wagner, D.3
-
84
-
-
58149096831
-
-
Cryptology ePrint Archive, Report 2008/166
-
Courtois, N.T., Nohl, K., O'Neil, S.: Algebraic attacks on the Crypto-1 stream cipher in Mi-Fare Classic and Oyster Cards. Cryptology ePrint Archive, Report 2008/166 (2008). Available at http://eprint.iacr.org/2008/166
-
(2008)
Algebraic Attacks on the Crypto-1 Stream Cipher in Mi-Fare Classic and Oyster Cards
-
-
Courtois, N.T.1
Nohl, K.2
O'Neil, S.3
-
85
-
-
0003908675
-
-
second edn. Undergraduate Texts in Mathematics. Springer-Verlag
-
Cox, D., Little, J., O'Shea, D.: Ideals, Varieties, and Algorithms: An Introduction to Computational Algebraic Geometry and Commutative Algebra, second edn. Undergraduate Texts in Mathematics. Springer-Verlag (2006)
-
(2006)
Ideals, Varieties, and Algorithms: An Introduction to Computational Algebraic Geometry and Commutative Algebra
-
-
Cox, D.1
Little, J.2
O'Shea, D.3
-
88
-
-
0037873264
-
Rijndael
-
Daemen, J., Rijmen, V.: Rijndael. AES Proposal (1999). Available at http://csrc. nist.gov/CryptoToolkit/aes/rijndael/Rijndael-ammended.pdf
-
(1999)
AES Proposal
-
-
Daemen, J.1
Rijmen, V.2
-
89
-
-
0001900752
-
Maximization of a linear function of variables subject to linear inequalities
-
T.J.C. Koopmans (ed.) Wiley
-
Danzig, G.: Maximization of a linear function of variables subject to linear inequalities. In: T.J.C. Koopmans (ed.) Activity Analysis of Production and Allocation, pp. 339-347. Wiley (1951)
-
(1951)
Activity Analysis of Production and Allocation
, pp. 339-347
-
-
Danzig, G.1
-
90
-
-
84919401135
-
A machine program for theorem proving
-
ACM
-
Davis, M., Logemann, G., Loveland, D.: A machine program for theorem proving. Communications of the ACM 5(7), 394-397 (1962)
-
(1962)
Communications of the
, vol.5
, Issue.7
, pp. 394-397
-
-
Davis, M.1
Logemann, G.2
Loveland, D.3
-
93
-
-
84895222502
-
-
Tech. Rep. Technical Report AN642, Microchip Corporation
-
Dawson, S.: Code hopping decoder using a PIC16C56. Tech. Rep. Technical Report AN642, Microchip Corporation. Available at http://www.keeloq.boom.ru/ decryption.pdf
-
Code Hopping Decoder Using A PIC16C56
-
-
Dawson, S.1
-
94
-
-
84882574815
-
-
Tech. rep., University of Cincinnati
-
Ding, J., Gower, J., Schmidt, D.: Zhuang-Zi: A new algorithm for solving multivariate polynomial equations over a finite field. Tech. rep., University of Cincinnati (2006)
-
(2006)
Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over A Finite Field
-
-
Ding, J.1
Gower, J.2
Schmidt, D.3
-
95
-
-
84895328118
-
-
Cryptology ePrint Archive Report 2006/038 and presented at the IMA Annual Workshop on Algorithms in Algebraic Geometry
-
Ding, J., Gower, J., Schmidt, D.: Zhuang-Zi: A new algorithm for solving multivariate polynomial equations over a finite field. Cryptology ePrint Archive, Report 2006/038 (2006). Available at http://eprint.iacr.org/2006/038, and presented at the IMA Annual Workshop on Algorithms in Algebraic Geometry
-
(2006)
Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over A Finite Field
-
-
Ding, J.1
Gower, J.2
Schmidt, D.3
-
97
-
-
67650699727
-
Cube attacks on tweakable black box polynomials
-
A. Joux (ed.) Springer-Verlag
-
Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: A. Joux (ed.) Advances in Cryptology-Proc. of EUROCRYPT, Lecture Notes in Computer Science, vol. 5479, pp. 278-299. Springer-Verlag (2009)
-
(2009)
Advances in Cryptology-Proc. of EUROCRYPT, Lecture Notes in Computer Science
, vol.5479
, pp. 278-299
-
-
Dinur, I.1
Shamir, A.2
-
98
-
-
84966249438
-
Asymptotically fast factorization of integers
-
Dixon, J.: Asymptotically fast factorization of integers. Mathematics of Computation 36, 255-260 (1981)
-
(1981)
Mathematics of Computation
, vol.36
, pp. 255-260
-
-
Dixon, J.1
-
101
-
-
26444549375
-
Effective preprocessing in SAT through variable and clause elimination
-
F. Bacchus, T. Walsh (eds.) Springer-Verlag
-
Een, N., Biere, A.: Effective preprocessing in SAT through variable and clause elimination. In: F. Bacchus, T. Walsh (eds.) Theory and Applications of Satisfiability Testing (SAT'05), Lecture Notes in Computer Science, vol. 3569, pp. 61-75. Springer-Verlag (2005)
-
(2005)
Theory and Applications of Satisfiability Testing (SAT'05), Lecture Notes in Computer Science
, vol.3569
, pp. 61-75
-
-
Een, N.1
Biere, A.2
-
102
-
-
30344450270
-
An extensible SAT-solver
-
E. Giunchiglia, A. Tacchella (eds.) Springer-Verlag
-
Eén, N., Sörensson, N.: An extensible SAT-solver. In: E. Giunchiglia, A. Tacchella (eds.) Theory and Applications of Satisfiability Testing (SAT'03), Lecture Notes in Computer Science, vol. 2919, pp. 333-336. Springer-Verlag (2003)
-
(2003)
Theory and Applications of Satisfiability Testing (SAT'03), Lecture Notes in Computer Science
, vol.2919
, pp. 333-336
-
-
Eén, N.1
Sörensson, N.2
-
103
-
-
26444549375
-
Minisat - A SAT solver with conflict-clause minimization
-
F. Bacchus, T. Walsh (eds.) Springer-Verlag
-
Eén, N., Sörensson, N.: Minisat-a SAT solver with conflict-clause minimization. In: F. Bacchus, T. Walsh (eds.) Proc. Theory and Applications of Satisfiability Testing (SAT'05), Lecture Notes in Computer Science, vol. 3569, pp. 61-75. Springer-Verlag (2005)
-
(2005)
Proc. Theory and Applications of Satisfiability Testing (SAT'05), Lecture Notes in Computer Science
, vol.3569
, pp. 61-75
-
-
Eén, N.1
Sörensson, N.2
-
104
-
-
44649115970
-
Attacking Bivium using SAT solvers
-
H.K. Büning, X. Zhao (eds.) Springer-Verlag
-
Eibach, T., Pilz, E., Völkel, G.: Attacking Bivium using SAT solvers. In: H.K. Büning, X. Zhao (eds.) Theory and Applications of Satisfiability Testing (SAT '08), Lecture Notes in Computer Science, vol. 4996, pp. 63-76. Springer-Verlag (2008)
-
(2008)
Theory and Applications of Satisfiability Testing (SAT '08), Lecture Notes in Computer Science
, vol.4996
, pp. 63-76
-
-
Eibach, T.1
Pilz, E.2
Völkel, G.3
-
105
-
-
51849131973
-
On the power of power analysis in the real world: A complete break of the KeeLoqCode Hopping Scheme
-
D. Wagner (ed.) Springer-Verlag
-
Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.T.M.: On the power of power analysis in the real world: A complete break of the KeeLoqCode Hopping Scheme. In: D. Wagner (ed.) CRYPTO, Lecture Notes in Computer Science, vol. 5157, pp. 203-220. Springer-Verlag (2008)
-
(2008)
CRYPTO, Lecture Notes in Computer Science
, vol.5157
, pp. 203-220
-
-
Eisenbarth, T.1
Kasper, T.2
Moradi, A.3
Paar, C.4
Salmasizadeh, M.5
Shalmani, M.T.M.6
-
110
-
-
35248840150
-
Algebraic cryptanalysis of Hidden Field Equation (HFE) cryptosys-tems using Gröbner Bases
-
D. Boneh (ed.) Springer-Verlag
-
Faugère, J.C., Joux, A.: Algebraic cryptanalysis of Hidden Field Equation (HFE) cryptosys-tems using Gröbner Bases. In: D. Boneh (ed.) Advances in Cryptology-Proc. of CRYPTO, Lecture Notes in Computer Science, vol. 2729, pp. 44-60. Springer-Verlag (2003)
-
(2003)
Advances in Cryptology-Proc. of CRYPTO, Lecture Notes in Computer Science
, vol.2729
, pp. 44-60
-
-
Faugère, J.C.1
Joux, A.2
-
111
-
-
33644927793
-
Automated proofs of upper bounds on the running time of splitting algorithms [English translation, original is in Russian]
-
Fedin, S.S., Kulikov, A.S.: Automated proofs of upper bounds on the running time of splitting algorithms [English translation, original is in Russian]. Journal of Mathematical Sciences 134(5), 2383-2391 (2006)
-
(2006)
Journal of Mathematical Sciences
, vol.134
, Issue.5
, pp. 2383-2391
-
-
Fedin, S.S.1
Kulikov, A.S.2
-
112
-
-
84949194630
-
A simple algebraic representation of Rijndael
-
S. Vaudenay, A.M. Youssef (eds.) Springer-Verlag
-
Ferguson, N., Schroeppel, R., Whiting, D.: A simple algebraic representation of Rijndael. In: S. Vaudenay, A.M. Youssef (eds.) Proc. Selected Areas in Cryptography (SAC01), Lecture Notes in Computer Science, vol. 2259, pp. 103-111. Springer-Verlag (2001)
-
(2001)
Proc. Selected Areas in Cryptography (SAC01), Lecture Notes in Computer Science
, vol.2259
, pp. 103-111
-
-
Ferguson, N.1
Schroeppel, R.2
Whiting, D.3
-
113
-
-
0042514966
-
How to fake an RSA signature by encoding modular root finding as a SAT problem
-
Fiorini, C., Martinelli, E., Massacci, F.: How to fake an RSA signature by encoding modular root finding as a SAT problem. Discrete Applied Mathematics 130(2), 101-127 (2003)
-
(2003)
Discrete Applied Mathematics
, vol.130
, Issue.2
, pp. 101-127
-
-
Fiorini, C.1
Martinelli, E.2
Massacci, F.3
-
114
-
-
85026782846
-
-
Fischer, S. Ph.D. thesis, École Polytechnique Fédé ral de Lausanne
-
Fischer, S.: Analysis of lightweight stream ciphers. Ph.D. thesis, École Polytechnique Fédéral de Lausanne (2008)
-
(2008)
Analysis of Lightweight Stream Ciphers
-
-
-
116
-
-
84895285520
-
-
Tech. rep., Universität Essen, Fachbereich Mathematik, Essen
-
Fleischmann, P., Michler, G., Roelse, P., Rosenboom, J., Staszewski, R., Wagner, C., Weller, M.: Linear algebra over small finite fields on parallel machines. Tech. rep., Universität Essen, Fachbereich Mathematik, Essen (1995)
-
(1995)
Linear Algebra over Small Finite Fields on Parallel Machines
-
-
Fleischmann, P.1
Michler, G.2
Roelse, P.3
Rosenboom, J.4
Staszewski, R.5
Wagner, C.6
Weller, M.7
-
118
-
-
84895370210
-
Contemporary abstract algebra
-
Gallian, J.A.: Contemporary Abstract Algebra. Heath (1986)
-
(1986)
Heath
-
-
Gallian, J.A.1
-
121
-
-
84966224573
-
Factoring large numbers with a quadratic sieve
-
Gerver, J.: Factoring large numbers with a quadratic sieve. Mathematics of Computation 41, 287-294 (1983)
-
(1983)
Mathematics of Computation
, vol.41
, pp. 287-294
-
-
Gerver, J.1
-
122
-
-
85034825830
-
Some effectivity problems in polynomial ideal theory
-
J. Fitch (ed.) Springer-Verlag
-
Giusti, M.: Some effectivity problems in polynomial ideal theory. In: J. Fitch (ed.) Proc. of EUROSAM 84, Lecture Notes in Computer Science, vol. 174, pp. 159-171. Springer-Verlag (1984)
-
(1984)
Proc. of EUROSAM 84, Lecture Notes in Computer Science
, vol.174
, pp. 159-171
-
-
Giusti, M.1
-
123
-
-
27844451372
-
Incompleteness: The proof and paradox of Kurt Gödel
-
W. W. Norton & Company
-
Goldstein, R.: Incompleteness: The Proof and Paradox of Kurt Gödel. Great Discoveries. W. W. Norton & Company (2005)
-
(2005)
Great Discoveries
-
-
Goldstein, R.1
-
126
-
-
84937500998
-
Cryptanalysis of the TTM cryptosystem
-
T. Okamoto (ed.) Springer-Verlag
-
Goubin, L., Courtois, N.: Cryptanalysis of the TTM Cryptosystem. In: T. Okamoto (ed.) Advances in Cryptology-Proc. of ASIACRYPT, Lecture Notes in Computer Science, vol. 1976, pp. 44-57. Springer-Verlag (2000)
-
(2000)
Advances in Cryptology-Proc. of ASIACRYPT, Lecture Notes in Computer Science
, vol.1976
, pp. 44-57
-
-
Goubin, L.1
Courtois, N.2
-
127
-
-
38149057656
-
Perfect block ciphers with small blocks
-
A. Biryukov (ed.) Springer-Verlag
-
Granboulan, L., Pornin, T.: Perfect block ciphers with small blocks. In: A. Biryukov (ed.) Proc. of Fast Software Encryption (FSE'07), Lecture Notes in Computer Science, vol. 4593, pp. 452-463. Springer-Verlag (2007)
-
(2007)
Proc. of Fast Software Encryption (FSE'07), Lecture Notes in Computer Science
, vol.4593
, pp. 452-463
-
-
Granboulan, L.1
Pornin, T.2
-
130
-
-
0004290782
-
-
fourth edn. Graduate Texts in Mathematics. Springer-Verlag
-
Greub, W.: Linear Algebra, fourth edn. Graduate Texts in Mathematics. Springer-Verlag (1981)
-
(1981)
Linear Algebra
-
-
Greub, W.1
-
132
-
-
84895200124
-
Some performance studies in exact linear algebra, english summary
-
G. Cooperman, E. Jessen, G.O. Michler (eds.) Springer-Verlag, Essen
-
Havas, G., Wagner, C.: Some performance studies in exact linear algebra, english summary. In: G. Cooperman, E. Jessen, G.O. Michler (eds.) Worksop on Wide Area Networks and High Performance Computing, Lecture Notes in Control and Information Science, vol. 249, pp. 161-170. Springer-Verlag, Essen (1998)
-
(1998)
Worksop on Wide Area Networks and High Performance Computing, Lecture Notes in Control and Information Science
, vol.249
, pp. 161-170
-
-
Havas, G.1
Wagner, C.2
-
133
-
-
35048843339
-
Rewriting variables: The complexity of fast algebraic attacks on stream ciphers
-
Springer-Verlag
-
Hawkes, P., Rose, G.: Rewriting variables: The complexity of fast algebraic attacks on stream ciphers. In: Advances in Cryptology-Proc. of CRYPTO, Lecture Notes in Computer Science, vol. 3152, pp. 390-406. Springer-Verlag (2004)
-
(2004)
Advances in Cryptology-Proc. of CRYPTO Lecture Notes in Computer Science
, vol.3152
, pp. 390-406
-
-
Hawkes, P.1
Rose, G.2
-
136
-
-
0033687739
-
New worst-case upper bounds for SAT
-
Hirsch, E.A.: New worst-case upper bounds for SAT. Journal of Automated Reasoning 24(4), 397-420 (2000)
-
(2000)
Journal of Automated Reasoning
, vol.24
, Issue.4
, pp. 397-420
-
-
Hirsch, E.A.1
-
137
-
-
84937417239
-
A probabilistic 3-SAT algorithm further improved
-
H. Alt, A. Ferreira (eds.) Springer-Verlag
-
Hofmeister, T., Schöning, U., Schuler, R., Watanabe, O.: A probabilistic 3-SAT algorithm further improved. In: H. Alt, A. Ferreira (eds.) 19th Annual Symposium on Theoretical Aspects of Computer Sciences (STACS'02), Lecture Notes in Computer Science, vol. 2285, pp. 192-202. Springer-Verlag (2002)
-
(2002)
19th Annual Symposium on Theoretical Aspects of Computer Sciences (STACS'02), Lecture Notes in Computer Science
, vol.2285
, pp. 192-202
-
-
Hofmeister, T.1
Schöning, U.2
Schuler, R.3
Watanabe, O.4
-
138
-
-
50249155875
-
Differential fault analysis of Trivium
-
K. Nyberg (ed.) Springer-Verlag
-
Hojsík, M., Rudolf, B.: Differential fault analysis of Trivium. In: K. Nyberg (ed.) Fast Software Encryption (FSE'08), Lecture Notes in Computer Science, vol. 5086, pp. 158-172. Springer-Verlag (2008)
-
(2008)
Fast Software Encryption (FSE'08), Lecture Notes in Computer Science
, vol.5086
, pp. 158-172
-
-
Hojsík, M.1
Rudolf, B.2
-
139
-
-
58549106642
-
Floating fault analysis of Trivium
-
D.R. Chowdhury, V. Rij-men, A. Das (eds.) Springer-Verlag
-
Hojsík, M., Rudolf, B.: Floating fault analysis of Trivium. In: D.R. Chowdhury, V. Rij-men, A. Das (eds.) Progress in Cryptology (INDOCRYPT'08), Lecture Notes in Computer Science, vol. 5365, pp. 239-250. Springer-Verlag (2008)
-
(2008)
Progress in Cryptology (INDOCRYPT'08), Lecture Notes in Computer Science
, vol.5365
, pp. 239-250
-
-
Hojsík, M.1
Rudolf, B.2
-
140
-
-
0001796902
-
A generalization of the fast LUP matrix decomposition algorithm and applications
-
Ibara, O.H., Moran, S., Hui, R.: A generalization of the fast LUP matrix decomposition algorithm and applications. Journal of Algorithms 1(3), 45-56 (1982)
-
(1982)
Journal of Algorithms
, vol.1
, Issue.3
, pp. 45-56
-
-
Ibara, O.H.1
Moran, S.2
Hui, R.3
-
141
-
-
44449126213
-
A practical attack on Keeloq
-
N.P. Smart (ed.) Springer-Verlag
-
Indesteege, S., Keller, N., Dunkelman, O., Biham, E., Preneel, B.: A practical attack on Keeloq. In: N.P. Smart (ed.) Advances in Cryptology-Proc. of EUROCRYPT, Lecture Notes in Computer Science, vol. 4965, pp. 1-18. Springer-Verlag (2008)
-
(2008)
Advances in Cryptology-Proc. of EUROCRYPT, Lecture Notes in Computer Science
, vol.4965
, pp. 1-18
-
-
Indesteege, S.1
Keller, N.2
Dunkelman, O.3
Biham, E.4
Preneel, B.5
-
142
-
-
33646195234
-
Logical analysis of hash functions
-
B. Gramlich (ed.) Springer-verlag
-
Jovanovic, D., Janicic, P.: Logical analysis of hash functions. In: B. Gramlich (ed.) Proceedings of the Frontiers of Combining Systems, Lecture Notes in Artificial Intelligence, vol. 3717, pp. 200-215. Springer-verlag (2005)
-
(2005)
Proceedings of the Frontiers of Combining Systems, Lecture Notes in Artificial Intelligence
, vol.3717
, pp. 200-215
-
-
Jovanovic, D.1
Janicic, P.2
-
145
-
-
84968492714
-
Analysis of Coppersmith's Block Wiedemann algorithm for the parallel solution of sparse linear systems
-
Kaltofen, E.: Analysis of Coppersmith's Block Wiedemann algorithm for the parallel solution of sparse linear systems. Mathematics of Computation 64(210), 777-806 (1995)
-
(1995)
Mathematics of Computation
, vol.64
, Issue.210
, pp. 777-806
-
-
Kaltofen, E.1
-
146
-
-
84968495217
-
On Wiedemann's method of solving sparse linear systems
-
H.F. Mattson, T. Mora, T.R.N. Rao (eds.) Springer-Verlag
-
Kaltofen, E., Saunders, B.D.: On Wiedemann's method of solving sparse linear systems. In: H.F. Mattson, T. Mora, T.R.N. Rao (eds.) Proceedings of the 9th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, Lecture Notes in Computer Science, vol. 539, pp. 29-38. Springer-Verlag (1991)
-
(1991)
Proceedings of the 9th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, Lecture Notes in Computer Science
, vol.539
, pp. 29-38
-
-
Kaltofen, E.1
Saunders, B.D.2
-
147
-
-
0003037529
-
Reducibility among combinatorial problems
-
IBM Thomas J. Watson Res. Center, Plenum, Yorktown Heights, New York
-
Karp, R.: Reducibility among combinatorial problems. In: Proc. of Symposium on Complexity of Computer Computations, pp. 85-103. IBM Thomas J. Watson Res. Center, Plenum, Yorktown Heights, New York (1972)
-
(1972)
Proc. of Symposium on Complexity of Computer Computations
, pp. 85-103
-
-
Karp, R.1
-
150
-
-
32644446567
-
-
second edn. American Mathematical Society
-
Krantz, S.G.: How to Teach Mathematics, second edn. American Mathematical Society (1999)
-
(1999)
How to Teach Mathematics
-
-
Krantz, S.G.1
-
154
-
-
35248891439
-
The complexity of boolean matrix root computation
-
T. Warnow, B. Zhu (eds.) Springer-Verlag
-
Kutz, M.: The complexity of boolean matrix root computation. In: T. Warnow, B. Zhu (eds.) Proc. of Computing and Combinatorics, Lecture Notes in Computer Science, vol. 2697, pp. 212-221. Springer-Verlag (2003)
-
(2003)
Proc. of Computing and Combinatorics, Lecture Notes in Computer Science
, vol.2697
, pp. 212-221
-
-
Kutz, M.1
-
155
-
-
84988216913
-
Solving large sparse linear systems over finite fields
-
A. Menezes, S.A. Vanstone (eds.) Springer-Verlag
-
LaMacchia, B., Odlyzko, A.: Solving large sparse linear systems over finite fields. In: A. Menezes, S.A. Vanstone (eds.) Advances in Cryptology-Proc. of CRYPTO, Lecture Notes in Computer Science, vol. 537, pp. 109-133. Springer-Verlag (1990)
-
(1990)
Advances in Cryptology-Proc. of CRYPTO, Lecture Notes in Computer Science
, vol.537
, pp. 109-133
-
-
Lamacchia, B.1
Odlyzko, A.2
-
157
-
-
85034440461
-
Gröbner-bases, Gaussian Elimination and resolution of systems of algebraic equations
-
J.A. van Hulzen (ed.) Springer-Verlag
-
Lazard, D.: Gröbner-bases, Gaussian Elimination and resolution of systems of algebraic equations. In: J.A. van Hulzen (ed.) EUROCAL 1983, Lecture Notes in Computer Science, vol. 162, pp. 146-156. Springer-Verlag (1983)
-
(1983)
EUROCAL 1983, Lecture Notes in Computer Science
, vol.162
, pp. 146-156
-
-
Lazard, D.1
-
158
-
-
0003638131
-
The development of the number field sieve
-
Springer-Verlag
-
Lenstra, A.K., Jr., H.W.L.: The Development of the Number Field Sieve. Lecture Notes in Mathematics. Springer-Verlag (1993)
-
(1993)
Lecture Notes in Mathematics
-
-
Lenstra, Jr.A.K.1
-
160
-
-
40649097746
-
Heuristics to accelerate the dixon resultant
-
Lewis, R.: Heuristics to accelerate the dixon resultant. Mathematics and Computers in Simulation 77(4), 400-407 (2008)
-
(2008)
Mathematics and Computers in Simulation
, vol.77
, Issue.4
, pp. 400-407
-
-
Lewis, R.1
-
161
-
-
4243631163
-
Comparison of polynomial-oriented computer algebra systems
-
Lewis, R., Wester, M.: Comparison of polynomial-oriented computer algebra systems. SIGSAM Bulletin 33(4), 5-13 (1999)
-
(1999)
SIGSAM Bulletin
, vol.33
, Issue.4
, pp. 5-13
-
-
Lewis, R.1
Wester, M.2
-
162
-
-
0036444256
-
Conic tangency equations and Apollonius problems in biochemistry and pharmacology
-
Lewis, R.H., Bridgett, S.: Conic tangency equations and Apollonius problems in biochemistry and pharmacology. Mathematics and Computers in Simulation 61(2), 101-114 (2003)
-
(2003)
Mathematics and Computers in Simulation
, vol.61
, Issue.2
, pp. 101-114
-
-
Lewis, R.H.1
Bridgett, S.2
-
166
-
-
56749178556
-
q
-
J. Buchmann, J. Ding (eds.) Springer-Verlag
-
q. In: J. Buchmann, J. Ding (eds.) Post-Quantum Cryptography (PQC'08), Lecture Notes in Computer Science, vol. 5299, pp. 181-202. Springer-Verlag (2008)
-
(2008)
Post-Quantum Cryptography (PQC'08), Lecture Notes in Computer Science
, vol.5299
, pp. 181-202
-
-
Liu, F.H.1
Lu, C.J.2
Yang, B.Y.3
-
167
-
-
49649140846
-
Normal hypergraphs and the perfect graph conjecture
-
Lovász, L.: Normal hypergraphs and the perfect graph conjecture. Discrete Mathematics 2, 253-267 (1972)
-
(1972)
Discrete Mathematics
, vol.2
, pp. 253-267
-
-
Lovász, L.1
-
168
-
-
0000444373
-
The elimination form of the inverse and its application to linear programming
-
Markowitz, H.M.: The elimination form of the inverse and its application to linear programming. Management Science 3(3), 255-269 (1957)
-
(1957)
Management Science
, vol.3
, Issue.3
, pp. 255-269
-
-
Markowitz, H.M.1
-
169
-
-
0032680865
-
GRASP: A search algorithm for propositional satisfiability
-
Marques-Silva, J.P., Sakallah, K.A.: GRASP: a search algorithm for propositional satisfiability. IEEE Transactions on Computers 45(5), 506-521 (1999)
-
(1999)
IEEE Transactions on Computers
, vol.45
, Issue.5
, pp. 506-521
-
-
Marques-Silva, J.P.1
Sakallah, K.A.2
-
171
-
-
0343978359
-
Using Walk-SAT and Rel-SAT for cryptographic key search
-
T. Dean (ed.) Morgan Kaufmann Publishing
-
Massacci, F.: Using Walk-SAT and Rel-SAT for cryptographic key search. In: T. Dean (ed.) Proc. 16th International Joint Conference on Artificial Intelligence, pp. 290-295. Morgan Kaufmann Publishing (1999)
-
(1999)
Proc. 16th International Joint Conference on Artificial Intelligence
, pp. 290-295
-
-
Massacci, F.1
-
172
-
-
0034140491
-
Logical cryptanalysis as a SAT-problem: Encoding and analysis of the US data encryption standard
-
Massacci, F., Marraro, L.: Logical cryptanalysis as a SAT-problem: Encoding and analysis of the US data encryption standard. Journal of Automated Reasoning 24 (2000)
-
(2000)
Journal of Automated Reasoning
, vol.24
-
-
Massacci, F.1
Marraro, L.2
-
173
-
-
38549124306
-
Two trivial attacks on Trivium
-
C.M. Adams, A. Miri, M.J. Wiener (eds.) Springer-Verlag
-
Maximov, A., Biryukov, A.: Two trivial attacks on Trivium. In: C.M. Adams, A. Miri, M.J. Wiener (eds.) Proc. Selected Areas in Cryptography (SAC07), Lecture Notes in Computer Science, vol. 4876, pp. 36-55. Springer-Verlag (2007). Available from http://eprint. iacr.org/2007/021
-
(2007)
Proc. Selected Areas in Cryptography (SAC07), Lecture Notes in Computer Science
, vol.4876
, pp. 36-55
-
-
Maximov, A.1
Biryukov, A.2
-
174
-
-
84895237648
-
-
Cryptology ePrint Archive Report 2007/129 and presented at the International Conference on Boolean Functions: Cryptography and Applications (BFCA'2008)
-
McDonald, C., Charnes, C., Pieprzyk, J.: An algebraic analysis of Trivium ciphers based on the boolean satisfiability problem. Cryptology ePrint Archive, Report 2007/129 (2007). Available at http://eprint.iacr.org/2007/129, and presented at the International Conference on Boolean Functions: Cryptography and Applications (BFCA'2008)
-
(2007)
An Algebraic Analysis of Trivium Ciphers Based on the Boolean Satisfiability Problem
-
-
McDonald, C.1
Charnes, C.2
Pieprzyk, J.3
-
175
-
-
33749578685
-
Applications of SAT solvers to cryptanalysis of hash functions
-
A. Biere, C.P. Gomes (eds.) Springer-Verlag, Also Available As IACR E-print 2006/254
-
Mironov, I., Zhang, L.: Applications of SAT solvers to cryptanalysis of hash functions. In: A. Biere, C.P. Gomes (eds.) Proc. Theory and Applications of Satisfiability Testing (SAT'06), Lecture Notes in Computer Science, vol. 4121, pp. 102-115. Springer-Verlag (2006). Also available as IACR E-print 2006/254
-
(2006)
Proc. Theory and Applications of Satisfiability Testing (SAT'06), Lecture Notes in Computer Science
, vol.4121
, pp. 102-115
-
-
Mironov, I.1
Zhang, L.2
-
176
-
-
84957682846
-
A Block Lanczos algorithm for finding dependencies over GF(2)
-
L.C. Guillou, J.J. Quisquater (eds.) Springer-Verlag
-
Montgomery, P.L.: A Block Lanczos algorithm for finding dependencies over GF(2). In: L.C. Guillou, J.J. Quisquater (eds.) Advances in Cryptology-Proc. of EUROCRYPT, Lecture Notes in Computer Science, vol. 921, pp. 106-120. Springer-Verlag (1995)
-
(1995)
Advances in Cryptology-Proc. of EUROCRYPT, Lecture Notes in Computer Science
, vol.921
, pp. 106-120
-
-
Montgomery, P.L.1
-
178
-
-
0001895223
-
How to compute fast a function and all its derivatives: A variation on the theorem of Baur-Strassen
-
Morgenstern, J.: How to compute fast a function and all its derivatives: a variation on the theorem of Baur-Strassen. SIGACT News 16(4), 60-62 (1985). DOI http://doi.acm.org/10. 1145/382242.382836
-
(1985)
SIGACT News
, vol.16
, Issue.4
, pp. 60-62
-
-
Morgenstern, J.1
-
180
-
-
0034852165
-
Chaff: Engineering an efficient SAT Solver
-
ACM
-
Moskewicz, M.W., Madigan, C.F., Zhao, Y., Zhang, L., Malik, S.: Chaff: Engineering an efficient SAT Solver. In: Proc. of 28th Design Automation Conference (DAC'01), pp. 530-535. ACM (2001)
-
(2001)
Proc. of 28th Design Automation Conference (DAC'01)
, pp. 530-535
-
-
Moskewicz, M.W.1
Madigan, C.F.2
Zhao, Y.3
Zhang, L.4
Malik, S.5
-
181
-
-
84957014368
-
Discrete logarithms in finite fields and their cryptographic significance
-
N. Cot (ed.) Springer-Verlag
-
Odlyzko, A.M.: Discrete logarithms in finite fields and their cryptographic significance. In: N. Cot (ed.) Advances in Cryptology-Proc. of EUROCRYPT, Lecture Notes in Computer Science, vol. 209, pp. 224-316. Springer-Verlag (1984)
-
(1984)
Advances in Cryptology-Proc. of EUROCRYPT, Lecture Notes in Computer Science
, vol.209
, pp. 224-316
-
-
Odlyzko, A.M.1
-
185
-
-
84947932132
-
Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): Two new families of asymmetric algorithms
-
N. Koblitz (ed.) Springer-Verlag
-
Patarin, J.: Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of asymmetric algorithms. In: N. Koblitz (ed.) Advances in Cryptology-Proc. of EUROCRYPT, Lecture Notes in Computer Science, vol. 1070, pp. 33-48. Springer-Verlag (1996)
-
(1996)
Advances in Cryptology-Proc. of EUROCRYPT, Lecture Notes in Computer Science
, vol.1070
, pp. 33-48
-
-
Patarin, J.1
-
186
-
-
30544433705
-
An improved exponential-time algorithm for k-SAT
-
Paturi, R., Pudlák, P., Saks, M.E., Zane, F.: An improved exponential-time algorithm for k-SAT. The Journal of the Association of Computing Machinery 52(3), 337-364 (2005)
-
(2005)
The Journal of the Association of Computing Machinery
, vol.52
, Issue.3
, pp. 337-364
-
-
Paturi, R.1
Pudlák, P.2
Saks, M.E.3
Zane, F.4
-
191
-
-
84950749641
-
Reduction of huge, sparse matrices over finite fields via created catastrophes
-
Pomerance, C., Smith, J.W.: Reduction of huge, sparse matrices over finite fields via created catastrophes. Experimental Mathematics 1(2), 89-94 (1992)
-
(1992)
Experimental Mathematics
, vol.1
, Issue.2
, pp. 89-94
-
-
Pomerance, C.1
Smith, J.W.2
-
192
-
-
84862815947
-
-
Final Technical Report
-
Preneel, B., Biryukov, A., Cannière, C.D., Ors, S.B., Oswald, E., van Rompay, B., Granboulan, L., Dottax, E., Martinet, G., Murphy, S., Dent, A., Shipsey, R., Swart, C., White, J., Dichtl, M., Pyka, S., Schafheutle, M., Serf, P., Biham, E., Barkan, E., Braziler, Y., Dunkelman, O., Furman, V., Kenigsberg, D., Stolin, J., Quisquater, J.J., Ciet, M., Sica, F.: NESSIE: Final report of european project number IST-1999-12324, named new european schemes for signatures, integrity, and encryption. Final Technical Report: Available at: https://www.cosic.esat.kuleuven.be/nessie/Bookv015.pdf (2004)
-
(2004)
NESSIE: Final Report of European Project Number IST-1999-12324, Named New European Schemes for Signatures, Integrity, and Encryption
-
-
Preneel, B.1
Biryukov, A.2
Cannière, C.D.3
Ors, S.B.4
Oswald, E.5
Van Rompay, B.6
Granboulan, L.7
Dottax, E.8
Martinet, G.9
Murphy, S.10
Dent, A.11
Shipsey, R.12
Swart, C.13
White, J.14
Dichtl, M.15
Pyka, S.16
Schafheutle, M.17
Serf, P.18
Biham, E.19
Barkan, E.20
Braziler, Y.21
Dunkelman, O.22
Furman, V.23
Kenigsberg, D.24
Stolin, J.25
Quisquater, J.J.26
Ciet, M.27
Sica, F.28
more..
-
193
-
-
58549098327
-
Slid pairs in Salsa20 and Trivium
-
D.R. Chowd-hury, V. Rijmen, A. Das (eds.) Springer-Verlag
-
Priemuth-Schmid, D., Biryukov, A.: Slid pairs in Salsa20 and Trivium. In: D.R. Chowd-hury, V. Rijmen, A. Das (eds.) Progress in Cryptology-INDOCRYPT'08, Lecture Notes in Computer Science, vol. 5365, pp. 1-14. Springer-Verlag (2008)
-
(2008)
Progress in Cryptology-INDOCRYPT'08, Lecture Notes in Computer Science
, vol.5365
, pp. 1-14
-
-
Priemuth-Schmid, D.1
Biryukov, A.2
-
194
-
-
57049177122
-
-
eStream Report:2006/039"
-
Raddum, H.: Cryptanalytic results on Trivium. eStream Report: 2006/039" (2006). Available at www.ecrypt.eu.org/stream/papersdir/2006/039. ps
-
(2006)
Cryptanalytic Results on Trivium
-
-
Raddum, H.1
-
195
-
-
51349116984
-
Solving multiple right hand sides linear equations
-
Raddum, H., Semaev, I.: Solving multiple right hand sides linear equations. Des. Codes Cryptography 49(1-3), 147-160 (2008)
-
(2008)
Des. Codes Cryptography
, vol.49
, Issue.1-3
, pp. 147-160
-
-
Raddum, H.1
Semaev, I.2
-
196
-
-
0034834489
-
Lower bounds for matrix product, in bounded depth circuits with arbitrary gates
-
Raz, R., Shpilka, A.: Lower bounds for matrix product, in bounded depth circuits with arbitrary gates. In: STOC, pp. 409-418 (2001)
-
(2001)
STOC
, pp. 409-418
-
-
Raz, R.1
Shpilka, A.2
-
197
-
-
0037609044
-
Lower bounds for matrix product in bounded depth circuits with arbitrary gates
-
Raz, R., Shpilka, A.: Lower bounds for matrix product in bounded depth circuits with arbitrary gates. SIAM J. Comput. 32(2), 488-513 (2003)
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.2
, pp. 488-513
-
-
Raz, R.1
Shpilka, A.2
-
198
-
-
50249094703
-
-
Paper available on the Internet
-
Riedel, M.R.: Random permutation statistics. Paper available on the Internet (2006). http://www.geocities.com/markoriedelde/papers/randperms.pdf
-
(2006)
Random Permutation Statistics
-
-
Riedel, M.R.1
-
199
-
-
24144458216
-
Representations and Rijndael descriptions
-
H. Dobbertin, V. Ri-jmen, A. Sowa (eds.) Springer-Verlag
-
Rijmen, V., Oswald, E.: Representations and Rijndael descriptions. In: H. Dobbertin, V. Ri-jmen, A. Sowa (eds.) 4th International Conference on the Advanced Encryption Standard (AES'04), Lecture Notes in Computer Science, vol. 3373, pp. 148-158. Springer-Verlag (2004)
-
(2004)
4th International Conference on the Advanced Encryption Standard (AES'04), Lecture Notes in Computer Science
, vol.3373
, pp. 148-158
-
-
Rijmen, V.1
Oswald, E.2
-
200
-
-
0001203681
-
Combinatorial properties of matrices of zeros and ones
-
Ryser, H.J.: Combinatorial properties of matrices of zeros and ones. Canadian Journal of Mathematics 9, 371-377 (1957)
-
(1957)
Canadian Journal of Mathematics
, vol.9
, pp. 371-377
-
-
Ryser, H.J.1
-
202
-
-
84895312219
-
Extending the Four-Russians bound to general matrix multiplication
-
Santoro, N.: Extending the Four-Russians bound to general matrix multiplication. Information Processing Letters (1979)
-
(1979)
Information Processing Letters
-
-
Santoro, N.1
-
203
-
-
0022603213
-
An improved algorithm for boolean matrix multiplication
-
Santoro, N., Urrutia, J.: An improved algorithm for boolean matrix multiplication. Computing 36 (1986)
-
(1986)
Computing
, vol.36
-
-
Santoro, N.1
Urrutia, J.2
-
204
-
-
0013069009
-
Partial and total matrix multiplication
-
Schönhage, A.: Partial and total matrix multiplication. Journal of Computing 10(3) (1981)
-
(1981)
Journal of Computing
, vol.10
, Issue.3
-
-
Schönhage, A.1
-
205
-
-
0001445381
-
Local search strategies for satisfiability testing
-
D.S. Johnson, M.A. Trick (eds.) AMS
-
Selman, B., Kautz, H., Cohen, B.: Local search strategies for satisfiability testing. In: D.S. Johnson, M.A. Trick (eds.) Cliques, Coloring, and Satisfiability: Second DIMACS Implementation Challenge (DIMACS'93), vol. 26. AMS (1996)
-
(1996)
Cliques, Coloring, and Satisfiability: Second DIMACS Implementation Challenge (DIMACS'93)
, vol.26
-
-
Selman, B.1
Kautz, H.2
Cohen, B.3
-
206
-
-
0027001335
-
A new method for solving hard satisfiability problems
-
Selman, B., Levesque, H.J., Mitchell, D.G.: A new method for solving hard satisfiability problems. In: 10th National Conference on Artificial Intelligence (AAAI'92), pp. 440-446 (1992)
-
(1992)
10th National Conference on Artificial Intelligence (AAAI'92)
, pp. 440-446
-
-
Selman, B.1
Levesque, H.J.2
Mitchell, D.G.3
-
207
-
-
84895278893
-
-
Cryptology ePrint Archive Report 2007/280 and presented at the Eleventh International Workshop on Algebraic and Combinatorial Coding Theory (ACCT'2008)
-
Semaev, I.: On solving sparse algebraic equations over finite fields II. Cryptology ePrint Archive, Report 2007/280 (2007). Available at http://eprint.iacr.org/2007/280, and presented at the Eleventh International Workshop on Algebraic and Combinatorial Coding Theory (ACCT'2008)
-
(2007)
On Solving Sparse Algebraic Equations over Finite Fields II
-
-
Semaev, I.1
-
208
-
-
51349154683
-
On solving sparse algebraic equations over finite fields
-
Semaev, I.: On solving sparse algebraic equations over finite fields. Designs Codes and Cryptography 49(1-3), 47-60 (2008)
-
(2008)
Designs Codes and Cryptography
, vol.49
, Issue.1-3
, pp. 47-60
-
-
Semaev, I.1
-
210
-
-
34250487811
-
Gaussian Elimination is not optimal
-
Strassen, V.: Gaussian Elimination is not optimal. Numerische Mathematik 13(3) (1969)
-
(1969)
Numerische Mathematik
, vol.13
, Issue.3
-
-
Strassen, V.1
-
211
-
-
84943702783
-
Relative bilinear complexity and matrix multiplication
-
This article is so long that it is split among two volumes
-
Strassen, V.: Relative bilinear complexity and matrix multiplication. J. Reine Angew. Math. 375-376 (1987). This article is so long that it is split among two volumes.
-
(1987)
J. Reine Angew. Math
, pp. 375-376
-
-
Strassen, V.1
-
215
-
-
0003424374
-
-
Society for Industrial and Applied Mathematics
-
Trefethen, L., III, D.B.: Numerical Linear Algebra. Society for Industrial and Applied Mathematics (1997)
-
(1997)
Numerical Linear Algebra
-
-
Trefethen III, L.1
-
219
-
-
8744284121
-
-
Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA
-
Warren, H.S.: Hacker's Delight. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA (2002)
-
(2002)
Hacker's Delight
-
-
Warren, H.S.1
-
221
-
-
84855533303
-
-
From MathWorld-A Wolfram Web Resource
-
Weisstein, E.W.: Apéry's constant. From MathWorld-A Wolfram Web Resource. Available at http://mathworld.wolfram.com/AperysConstant.html
-
Apéry's Constant
-
-
Weisstein, E.W.1
-
222
-
-
84895333267
-
-
From MathWorld-A Wolfram Web Resource
-
Weisstein, E.W.: Apollonius problem. From MathWorld-A Wolfram Web Resource. Available at http://mathworld.wolfram.com/PrimeNumberTheorem.html
-
Apollonius Problem
-
-
Weisstein, E.W.1
-
223
-
-
85025116601
-
-
From MathWorld-A Wolfram Web Resource
-
Weisstein, E.W.: Berlekamp-Massey algorithm. From MathWorld-A Wolfram Web Resource. Available at http://mathworld.wolfram.com/PrimeNumberTheorem. html
-
Berlekamp-Massey Algorithm
-
-
Weisstein, E.W.1
-
224
-
-
84895392577
-
-
From MathWorld-A Wolfram Web Resource
-
Weisstein, E.W.: Prime number theorem. From MathWorld-A Wolfram Web Resource. Available at http://mathworld.wolfram.com/PrimeNumberTheorem.html
-
Prime Number Theorem
-
-
Weisstein, E.W.1
-
225
-
-
84895264211
-
-
From MathWorld-A Wolfram Web Resource
-
Weisstein, E.W.: Relatively prime. From MathWorld-A Wolfram Web Resource. Available at http://mathworld.wolfram.com/RelativelyPrime.html
-
Relatively Prime
-
-
Weisstein, E.W.1
-
226
-
-
84895400821
-
-
From MathWorld-A Wolfram Web Resource
-
Weisstein, E.W.: Sylvester matrix. From MathWorld-A Wolfram Web Resource. Available at http://mathworld.wolfram.com/SylvesterMatrix.html
-
Sylvester Matrix
-
-
Weisstein, E.W.1
-
227
-
-
0343462141
-
Automated empirical optimization of software and the ATLAS Project
-
Whaley, R.C., Petitet, A., Dongarra, J.: Automated empirical optimization of software and the ATLAS Project. Parallel Computing 27(1-2), 3-35 (2001)
-
(2001)
Parallel Computing
, vol.27
, Issue.1-2
, pp. 3-35
-
-
Whaley, R.C.1
Petitet, A.2
Dongarra, J.3
-
228
-
-
0022583143
-
Solving sparse linear equations over finite fields
-
Wiedemann, D.H.: Solving sparse linear equations over finite fields. IEEE Transactions on Information Theory 32(1), 54-62 (1986)
-
(1986)
IEEE Transactions on Information Theory
, vol.32
, Issue.1
, pp. 54-62
-
-
Wiedemann, D.H.1
-
230
-
-
38149053130
-
Analysis of QUAD
-
A. Biryukov (ed.) Springer-Verlag
-
Yang, B.Y., Chen, O.C.H., Bernstein, D.J., Chen, J.M.: Analysis of QUAD. In: A. Biryukov (ed.) Proc. of Fast Software Encryption (FSE'07), Lecture Notes in Computer Science, vol. 4593, pp. 290-308. Springer-Verlag (2007)
-
(2007)
Proc. of Fast Software Encryption (FSE'07), Lecture Notes in Computer Science
, vol.4593
, pp. 290-308
-
-
Yang, B.Y.1
Chen, O.C.H.2
Bernstein, D.J.3
Chen, J.M.4
-
231
-
-
0037508524
-
List-coloring of interval graphs with application to register assignment for heterogeneous register-set architectures
-
Zeitlhofer, T., Wess, B.: List-coloring of interval graphs with application to register assignment for heterogeneous register-set architectures. Signal Processing 83(7), 1411-1425 (2003)
-
(2003)
Signal Processing
, vol.83
, Issue.7
, pp. 1411-1425
-
-
Zeitlhofer, T.1
Wess, B.2
|