-
1
-
-
33645600432
-
On the use of GF-inversion as a cryptographic primitive
-
M. Matsui and R. Zuccherato, editors Springer-Verlag
-
K. Aoki and S. Vaudenay. On the Use of GF-Inversion as a Cryptographic Primitive. In M. Matsui and R. Zuccherato, editors, Selected Areas in Cryptography (SAC) 2003, volume 3006 of LNCS, pages 234-347. Springer-Verlag, 2004.
-
(2004)
Selected Areas in Cryptography (SAC) 2003, Volume 3006 of LNCS
, pp. 234-347
-
-
Aoki, K.1
Vaudenay, S.2
-
2
-
-
85087539308
-
Linearity of the AES key schedule
-
H. Dob-bertin, V. Rijmen, and A. Sowa, editors Springer-Verlag
-
F. Armknecht and S. Lucks. Linearity of the AES Key Schedule. In H. Dob-bertin, V. Rijmen, and A. Sowa, editors, Advanced Encryption Standard-AES, Fourth International Conference, volume 3373 of LNCS, pages 145-162. Springer-Verlag, 2005.
-
(2005)
Advanced Encryption Standard-AES, Fourth International Conference, Volume 3373 of LNCS
, pp. 145-162
-
-
Armknecht, F.1
Lucks, S.2
-
4
-
-
35048863447
-
Comparison between XL and grobner basis algorithms
-
Pil .loong Lee, editor Springer-Verlag
-
G. Ars, .I-C. Faugere, H. Imai, M. Kawazoe, and M. Sugita. Comparison Between XL and Grobner Basis Algorithms. In Pil .loong Lee, editor, Advances in Cryptology-ASIACRYPT 2004, volume 3329 of LNCS, pages 338-353. Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology-ASIACRYPT 2004, Volume 3329 of LNCS
, pp. 338-353
-
-
Ars, G.1
Faugere, I.-C.2
Imai, H.3
Kawazoe, M.4
Sugita, M.5
-
5
-
-
84963657544
-
On the complexity of a grobner basis algorithm
-
M. Bardet. On the Complexity of a Grobner Basis Algorithm. Algorithms Seminar 2002-2004, INRIA, 2005. http://algo.inria.fr/seminars.
-
(2005)
Algorithms Seminar 2002-2004, INRIA
-
-
Bardet, M.1
-
7
-
-
84958748914
-
In how many ways can you write Rijndael?
-
Y. Zheng, editor Springer-Verlag
-
E. Barkan and E. Biham. In How Many Ways Can You Write Rijndael? In Y. Zheng, editor, Advances in Cryptology-ASIACRYPT 2002, volume 2501 of LNCS, pages 160-175. Springer-Verlag, 2002.
-
(2002)
Advances in Cryptology-ASIACRYPT 2002, Volume 2501 of LNCS
, pp. 160-175
-
-
Barkan, E.1
Biham, E.2
-
8
-
-
80052787224
-
The book of Rijndaels
-
E. Barkan and E. Biham. The Book of Rijndaels. Cryptology ePrint Archive 2002/158, 2002. http://eprint.iacr.org/2002/158/.
-
(2002)
Cryptology EPrint Archive
, vol.2002
, Issue.158
-
-
Barkan, E.1
Biham, E.2
-
9
-
-
84947939988
-
SERPENT: A new block cipher proposal
-
S. Vaudenay, editor Springer-Verlag
-
E. Biham, R.J. Anderson, and L.R. Knudsen. SERPENT: A New Block Cipher Proposal. In S. Vaudenay, editor, Fast Software Encryption 1998, volume 1372 of LNCS, pages 222-238. Springer-Verlag, 1998.
-
(1998)
Fast Software Encryption 1998, Volume 1372 of LNCS
, pp. 222-238
-
-
Biham, E.1
Anderson, R.J.2
Knudsen, L.R.3
-
10
-
-
0026397734
-
Differential cryptanalysis of DES-like cryptosys-tems
-
E. Biham and A. Shamir. Differential Cryptanalysis of DES-like Cryptosys-tems. Journal of Cryptology, 4:3-72, 1993.
-
(1993)
Journal of Cryptology
, vol.4
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
12
-
-
35248818760
-
A toolbox for cryptanalysis: Linear and affine equivalence algorithms
-
E. Biham, editor Springer-Verlag
-
A. Biryukov, C. De Canniere, A. Bracken, and B. Preneel. A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms. In E. Biham, editor, Advances in Cryptology-EUROCRYPT 2003, volume 2656 of LNCS, pages 33-50. Springer-Verlag, 2003.
-
(2003)
Advances in Cryptology-EUROCRYPT 2003, Volume 2656 of LNCS
, pp. 33-50
-
-
Biryukov, A.1
De Canniere, C.2
Bracken, A.3
Preneel, B.4
-
14
-
-
84895379345
-
A zero-dimensional grobner basis for AES-128
-
M.J.B. Robshaw, editor Springer-Verlag
-
J. Buchmann, A. Pychkine, and R-P. Weinmann. A Zero-dimensional Grobner Basis for AES-128. In M.J.B. Robshaw, editor, Fast Software Encryption 2006, volume 4047 of LNCS. Springer-Verlag, 2006.
-
Fast Software Encryption 2006, Volume 4047 of LNCS
, pp. 2006
-
-
Buchmann, J.1
Pychkine, A.2
Weinmann, R.-P.3
-
15
-
-
84962952893
-
DES is not a group
-
E.F. Brickell, editor Springer-Verlag
-
K.W. Campbell and M.J. Wiener. DES is Not a Group. In E.F. Brickell, editor, Advances in Cryptology-CRYPTO '92, volume 740 of LNCS, pages 512-520. Springer-Verlag, 1993.
-
(1993)
Advances in Cryptology-CRYPTO '92, Volume 740 of LNCS
, pp. 512-520
-
-
Campbell, K.W.1
Wiener, M.J.2
-
16
-
-
85034623360
-
Cryptanalysis of des with a reduced number of rounds
-
H.C. Williams, editor Springer-Verlag
-
D. Chaum and J-H. Evertse. Cryptanalysis of DES with a Reduced Number of Rounds. In H.C. Williams, editor, Advances in Cryptology-CRYPTO '85, volume 218 of LNCS, pages 192-211. Springer-Verlag, 1986.
-
(1986)
Advances in Cryptology-CRYPTO '85, Volume 218 of LNCS
, pp. 192-211
-
-
Chaum, D.1
Evertse, J.-H.2
-
17
-
-
33646811417
-
On asymptotic security estimates in XL and grobner bases-related algebraic cryptanalysis
-
J. Lopez, S. Qing, and E. Okhamoto, editors Springer-Verlag
-
J-M. Chen, N. Courtois, and B-Y. Yang. On Asymptotic Security Estimates in XL and Grobner Bases-Related Algebraic Cryptanalysis. In J. Lopez, S. Qing, and E. Okhamoto, editors, ICICS, volume 3269 of LNCS, pages 401-413. Springer-Verlag, 2004.
-
(2004)
ICICS, Volume 3269 of LNCS
, pp. 401-413
-
-
Chen, J.-M.1
Courtois, N.2
Yang, B.-Y.3
-
18
-
-
24944535234
-
All in the XL family: Theory and practice
-
C. Park and S. Chee, editors Springer-Verlag
-
J-M. Chen and B-Y. Yang. All in the XL Family: Theory and Practice. In C. Park and S. Chee, editors, Proceedings of the 7th Lnternational Conference on Information Security and Cryptology, volume 3506 of LNCS, pages 67-86. Springer-Verlag, 2004.
-
(2004)
Proceedings of the 7th Lnternational Conference on Information Security and Cryptology, Volume 3506 of LNCS
, pp. 67-86
-
-
Chen, J.-M.1
Yang, B.-Y.2
-
19
-
-
33646770907
-
Theoretical analysis of XL over small fields
-
H. Wang, J. Piepryzk, and V. Varadharajan, editors Springer-Verlag
-
J-M. Chen and B-Y. Yang. Theoretical Analysis of XL over Small Fields. In H. Wang, J. Piepryzk, and V. Varadharajan, editors, Proceedings of the 9th Australasian Conference on Information Security and Privacy, volume 3108 of LNCS, pages 277-288. Springer-Verlag, 2004.
-
(2004)
Proceedings of the 9th Australasian Conference on Information Security and Privacy, Volume 3108 of LNCS
, pp. 277-288
-
-
Chen, J.-M.1
Yang, B.-Y.2
-
20
-
-
33646807471
-
An analysis of the XSL algorithm
-
B. Roy, editor Springer-Verlag
-
C. Cid and G. Leurent. An Analysis of the XSL Algorithm. In B. Roy, editor, Advances in Cryptology-ASIACRYPT 2005, volume 3788 of LNCS, pages 333-352. Springer-Verlag, 2005.
-
(2005)
Advances in Cryptology-ASIACRYPT 2005, Volume 3788 of LNCS
, pp. 333-352
-
-
Cid, C.1
Leurent, G.2
-
21
-
-
33646852443
-
An algebraic framework for cipher embeddings
-
N.P. Smart, editor Springer-Verlag
-
C. Cid, S. Murphy, and M.J.B. Robshaw. An Algebraic Framework for Cipher Embeddings. In N.P. Smart, editor, 10th IMA International Conference on Coding and Cryptography, volume 3796 of LNCS, pages 278-289. Springer-Verlag, 2005.
-
(2005)
10th IMA International Conference on Coding and Cryptography, Volume 3796 of LNCS
, pp. 278-289
-
-
Cid, C.1
Murphy, S.2
Robshaw, M.J.B.3
-
22
-
-
26444546862
-
Small Scale variants of the AES
-
H. Gilbert and H. Handschuh, editors Springer-Verlag
-
C. Cid, S. Murphy, and M.J.B. Robshaw. Small Scale Variants of the AES. In H. Gilbert and H. Handschuh, editors, Fast Software Encryption 2005, volume 3557 of LNCS, pages 145-162. Springer-Verlag, 2005.
-
(2005)
Fast Software Encryption 2005, Volume 3557 of LNCS
, pp. 145-162
-
-
Cid, C.1
Murphy, S.2
Robshaw, M.J.B.3
-
24
-
-
84978995497
-
The real reason for Rivest's phenomenon
-
H.C. Williams, editor Springer-Verlag
-
D. Coppersmith. The Real Reason for Rivest's Phenomenon. In H.C. Williams, editor, Advances in Cryptology-CRYPTO '85, volume 218 of LNCS, pages 535-536. Springer-Verlag, 1986.
-
(1986)
Advances in Cryptology-CRYPTO '85, Volume 218 of LNCS
, pp. 535-536
-
-
Coppersmith, D.1
-
26
-
-
35048866377
-
fc): Applications to HFE challenge 2 and Sflash-v2
-
F. Bao, R. Deng, and J. Zhou, editor Springer-Verlag
-
fc): Applications to HFE Challenge 2 and Sflash-v2. In F. Bao, R. Deng, and J. Zhou, editor, Public Key Cryptography-PKC 2004, volume 2947 of LNCS, pages 201-217. Springer-Verlag, 2004.
-
(2004)
Public Key Cryptography-PKC 2004, Volume 2947 of LNCS
, pp. 201-217
-
-
Courtois, N.1
-
27
-
-
85086684103
-
The inverse S-box, non-linear polynomial relations and crypt-analysis of block ciphers
-
V. Rijmen H. Dobbertin and A. Sowa, editors Springer-Verlag
-
N. Courtois. The Inverse S-Box, Non-linear Polynomial Relations and Crypt-analysis of Block Ciphers. In V. Rijmen H. Dobbertin and A. Sowa, editors, Advanced Encryption Standard-AES, Fourth International Conference, volume 3373 of LNCS, pages 234-347. Springer-Verlag, 2005.
-
(2005)
Advanced Encryption Standard-AES, Fourth International Conference, Volume 3373 of LNCS
, pp. 234-347
-
-
Courtois, N.1
-
28
-
-
77649327985
-
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
-
B. Pre-neel, editor Springer-Verlag
-
N. Courtois, A. Klimov, J. Patarin, and A. Shamir. Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. In B. Pre-neel, editor, Advances in Cryptology-EUROCRYPT 2000, volume 1807 of LNCS, pages 392-407. Springer-Verlag, 2000.
-
(2000)
Advances in Cryptology-EUROCRYPT 2000, Volume 1807 of LNCS
, pp. 392-407
-
-
Courtois, N.1
Klimov, A.2
Patarin, J.3
Shamir, A.4
-
29
-
-
35248820612
-
Algebraic attacks on stream ciphers with linear feedback
-
E. Biham, editor Springer-Verlag
-
N. Courtois and W. Meier. Algebraic Attacks on Stream Ciphers with Linear Feedback. In E. Biham, editor, Advances in Cryptology-EUROCRYPT 2003, volume 2656 of LNCS, pages 345-359. Springer-Verlag, 2003.
-
(2003)
Advances in Cryptology-EUROCRYPT 2003, Volume 2656 of LNCS
, pp. 345-359
-
-
Courtois, N.1
Meier, W.2
-
30
-
-
33646819587
-
About the XL algorithm over GF(2)
-
M. Joye, editor Springer-Verlag
-
N. Courtois and J. Patarin. About the XL Algorithm over GF(2). In M. Joye, editor, Progress in Cryptology-CT-RSA 2003, pages 140-156. Springer-Verlag, 2003.
-
(2003)
Progress in Cryptology-CT-RSA 2003
, pp. 140-156
-
-
Courtois, N.1
Patarin, J.2
-
31
-
-
0347313908
-
Cryptanalysis of block ciphers with overdefined systems of equations
-
N. Courtois and J. Piepryzk. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. Cryptology ePrint Archive 2002/044, 2002. http://eprint.iacr.org/2002/044/.
-
(2002)
Cryptology EPrint Archive
, vol.2002
, Issue.44
-
-
Courtois, N.1
Piepryzk, J.2
-
32
-
-
84958765510
-
Cryptanalysis of block ciphers with overdefined systems of equations
-
Y. Zheng, editor Springer-Verlag
-
N. Courtois and J. Piepryzk. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. In Y. Zheng, editor, Advances in Cryptology-ASIACRYPT 2002, volume 2501 of LNCS, pages 267-287. Springer-Verlag, 2002.
-
(2002)
Advances in Cryptology-ASIACRYPT 2002, Volume 2501 of LNCS
, pp. 267-287
-
-
Courtois, N.1
Piepryzk, J.2
-
33
-
-
0003908675
-
Ideals, varieties, and algorithms
-
Springer-Verlag, second edition
-
D. Cox, J. Little, and D. O'Shea. Ideals, Varieties, and Algorithms. Undergraduate Texts in Mathematics. Springer-Verlag, second edition, 1997.
-
(1997)
Undergraduate Texts in Mathematics
-
-
Cox, D.1
Little, J.2
O'Shea, D.3
-
34
-
-
70149088437
-
-
Springer, second edition
-
D. Cox, I. Little, and D. O'Shea. Using Algebraic Geometry, volume 185 of Graduate Texts in Mathematics. Springer, second edition, 2004.
-
(2004)
Using Algebraic Geometry, Volume 185 of Graduate Texts in Mathematics
-
-
Cox, D.1
Little, I.2
O'Shea, D.3
-
36
-
-
84947444236
-
The block cipher SQUARE
-
E. Biham, editor Springer-Verlag
-
J. Daemen, L.R. Knudsen, and V. Rijmen. The Block Cipher SQUARE. In E. Biham, editor, Fast Software Encryption 1997, volume 1267 of LNCS, pages 149-165. Springer-Verlag, 1997.
-
(1997)
Fast Software Encryption 1997, Volume 1267 of LNCS
, pp. 149-165
-
-
Daemen, J.1
Knudsen, L.R.2
Rijmen, V.3
-
38
-
-
84895223753
-
Answer to "new observations on Rijndael"
-
J. Daemen and V. Rijmen. Answer to "New Observations on Rijndael". Submission to NIST AES Process, 2000. http://csrc.nist.gov/ CryptoToolkit/aes/.
-
(2000)
Submission to NIST AES Process
-
-
Daemen, J.1
Rijmen, V.2
-
41
-
-
24944450905
-
The XL-algorithm and a conjecture from commutative algebra
-
P.J. Lee, editor Springer-Verlag
-
C. Diem. The XL-Algorithm and a Conjecture from Commutative Algebra. In P.J. Lee, editor, Advances in Cryptology-ASIACRYPT 2004, volume 3329 of LAICS', pages 323-337. Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology-ASIACRYPT 2004, Volume 3329 of LAICS'
, pp. 323-337
-
-
Diem, C.1
-
42
-
-
24144490642
-
The cryptanalysis of the AES-A brief survey
-
H. Dobbertin, V. Rijmen, and A. Sowa, editors Springer-Verlag
-
H. Dobbertin, L.R. Knudsen, and M.J.B. Robshaw. The Cryptanalysis of the AES-A Brief Survey. In H. Dobbertin, V. Rijmen, and A. Sowa, editors, Advanced Encryption Standard-AES, Fourth International Conference, volume 3373 of LNCS, pages 1-10. Springer-Verlag, 2005.
-
(2005)
Advanced Encryption Standard-AES, Fourth International Conference, Volume 3373 of LNCS
, pp. 1-10
-
-
Dobbertin, H.1
Knudsen, L.R.2
Robshaw, M.J.B.3
-
43
-
-
84895346417
-
-
ECRYPT Technical Report, ECRYPT Network of Excellence
-
ECRYPT. The State of the Art of AES Cryptanalysis. Technical Report, ECRYPT Network of Excellence, 2005. http://wuw.ecrypt.eu.org.
-
(2005)
The State of the Art of AES Cryptanalysis
-
-
-
44
-
-
84895231315
-
-
ECRYPT. AES Lounge. Website ECRYPT Network of Excellence
-
ECRYPT. AES Lounge. Website, ECRYPT Network of Excellence, 2006. http://www.iaik.tu-graz.ac.at/research/krypto/AES/.
-
(2006)
-
-
-
45
-
-
84895206239
-
Cryptanalysis of des with a reduced number of rounds
-
D. Chaum and W.L. Price, editors Springer-Verlag
-
J-H. Evertse. Cryptanalysis of DES with a Reduced Number of Rounds. In D. Chaum and W.L. Price, editors, Advances in Cryptology-EUROCRYPT 87, volume 304 of LNCS, pages 249-266. Springer-Verlag, 1988.
-
(1988)
Advances in Cryptology-EUROCRYPT 87, Volume 304 of LNCS
, pp. 249-266
-
-
Evertse, J.-H.1
-
46
-
-
0033143274
-
A new efficient algorithm for computing Grobner bases (F4)
-
J-C. Faugere. A New Efficient Algorithm for Computing Grobner bases (F4). Journal of Pure and Applied Algebra, 139:61-88, 1999.
-
(1999)
Journal of Pure and Applied Algebra
, vol.139
, pp. 61-88
-
-
Faugere, J.-C.1
-
48
-
-
25944479355
-
Efficient computation of zero-dimensional grobner bases by change of ordering
-
J-C. Faugere, P. Gianni, D. Lazard, and T. Mora. Efficient Computation of Zero-dimensional Grobner Bases by Change of Ordering. Journal of Symbolic Computation, 16(4):329-344, 1993.
-
(1993)
Journal of Symbolic Computation
, vol.16
, Issue.4
, pp. 329-344
-
-
Faugere, J.-C.1
Gianni, P.2
Lazard, D.3
Mora, T.4
-
49
-
-
35248840150
-
Algebraic cryptanalysis of hidden field equation (HFE) cryptosystems using grobner bases
-
D. Boneh, editor Springer-Verlag
-
J-C. Faugere and A. Joux. Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems using Grobner Bases. In D. Boneh, editor, Advances in Cryptology-CRYPTO 2003, volume 2729 of LNCS, pages 44-60. Springer-Verlag, 2003.
-
(2003)
Advances in Cryptology-CRYPTO 2003, Volume 2729 of LNCS
, pp. 44-60
-
-
Faugere, J.-C.1
Joux, A.2
-
50
-
-
0001820140
-
Cryptography and computer piracy
-
H. Feistel. Cryptography and Computer Piracy. Scientific American, 228:15-23, 1973.
-
(1973)
Scientific American
, vol.228
, pp. 15-23
-
-
Feistel, H.1
-
51
-
-
24144436510
-
Improved cryptanalysis of Rijndael
-
B. Schneier, editor Springer-Verlag
-
N. Ferguson, J. Kelsey, B. Schneier, M. Stay, D. Wagner, and D. Whiting. Improved Cryptanalysis of Rijndael. In B. Schneier, editor, Fast Software Encryption 2000, volume 1978 of LNCS, pages 213-230. Springer-Verlag, 2000.
-
(2000)
Fast Software Encryption 2000, Volume 1978 of LNCS
, pp. 213-230
-
-
Ferguson, N.1
Kelsey, J.2
Schneier, B.3
Stay, M.4
Wagner, D.5
Whiting, D.6
-
52
-
-
84949194630
-
A simple algebraic representation of Rijndael
-
S. Vaudenay and A. Youssef, editors Springer-Verlag
-
N. Ferguson, R. Schroeppel, and D. Whiting. A Simple Algebraic Representation of Rijndael. In S. Vaudenay and A. Youssef, editors, Selected Areas in Cryptography (SAC) 2001, volume 2259 of LNCS, pages 103-111. Springer-Verlag, 2001.
-
(2001)
Selected Areas in Cryptography (SAC) 2001, Volume 2259 of LNCS
, pp. 103-111
-
-
Ferguson, N.1
Schroeppel, R.2
Whiting, D.3
-
53
-
-
0242487632
-
Linear redundancy in S-boxes
-
T. Johansson, editor Springer-Verlag
-
J. Fuller and W. Millan. Linear Redundancy in S-Boxes. In T. Johansson, editor, Fast Software Encryption 2003, volume 2887 of LNCS, pages 74-86. Springer-Verlag, 2003.
-
(2003)
Fast Software Encryption 2003, Volume 2887 of LNCS
, pp. 74-86
-
-
Fuller, J.1
Millan, W.2
-
56
-
-
0042416526
-
-
Technical Report 76-042, Stanford University Electronics Laboratories
-
M. Hellman, R. Merkle, R. Schroeppel, L. Washington, W. Dime, S. Pohlig, and P. Schweitzer. Results of an Initial Attempt to Cryptanalyse the NBS Data Encryption Standard. Technical Report 76-042, Stanford University Electronics Laboratories, 1976.
-
(1976)
Results of An Initial Attempt to Cryptanalyse the NBS Data Encryption Standard
-
-
Hellman, M.1
Merkle, R.2
Schroeppel, R.3
Washington, L.4
Dime, W.5
Pohlig, S.6
Schweitzer, P.7
-
57
-
-
0004271941
-
-
John Wiley & Sons, Second edition
-
I.N. Herstein. Topics in Algebra. John Wiley & Sons, Second edition, 1975.
-
(1975)
Topics in Algebra
-
-
Herstein, I.N.1
-
58
-
-
33745673169
-
Projective geometry over finite fields
-
Oxford University Press
-
J.W.P. Hirschfeld. Projective Geometry over Finite Fields. Oxford Mathematical Monographs. Oxford University Press, 1998.
-
(1998)
Oxford Mathematical Monographs
-
-
Hirschfeld, J.W.P.1
-
60
-
-
33745622156
-
Markov ciphers and alternating groups
-
T. Helleseth, editor Springer-Verlag
-
G. Hornauer, W. Stephan, and R. Wernsdorf. Markov Ciphers and Alternating Groups. In T. Helleseth, editor, Advances in Cryptology-EUROCRYPT '93, volume 765 of LNCS, pages 453-460. Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology-EUROCRYPT '93, Volume 765 of LNCS
, pp. 453-460
-
-
Hornauer, G.1
Stephan, W.2
Wernsdorf, R.3
-
61
-
-
84895410043
-
-
Technical Report RHUL-MA-2006-4, Royal Holloway, University of London
-
W-A. Jackson and S. Murphy. Projective Aspects of the AES Inversion. Technical Report RHUL-MA-2006-4, Royal Holloway, University of London, 2005. http://www.ma.rhul.ac.uk/techreport s/.
-
(2005)
Projective Aspects of the AES Inversion
-
-
Jackson, W.-A.1
Murphy, S.2
-
62
-
-
27544435027
-
Attacks on block ciphers of low algebraic degree
-
T. Jakobsen and L. Knudsen. Attacks on Block Ciphers of Low Algebraic Degree. Journal of Cryptology, 14:197-210, 2001.
-
(2001)
Journal of Cryptology
, vol.14
, pp. 197-210
-
-
Jakobsen, T.1
Knudsen, L.2
-
63
-
-
84947929289
-
The interpolation attack on block ciphers
-
E. Biham, editor Springer-Verlag
-
T. Jakobsen and L.R. Knudsen. The Interpolation Attack on Block Ciphers. In E. Biham, editor, Fast Software Encryption 1997, volume 1267 of LNCS, pages 28-40. Springer-Verlag, 1997.
-
(1997)
Fast Software Encryption 1997, Volume 1267 of LNCS
, pp. 28-40
-
-
Jakobsen, T.1
Knudsen, L.R.2
-
65
-
-
0023863663
-
Is the data encryption standard a group? (Results of Cycling Experiments on DES)
-
B.S. Kaliski, R. Rivest, and A.T. Sherman. Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES). Journal of Cryptology, 1:3-36, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 3-36
-
-
Kaliski, B.S.1
Rivest, R.2
Sherman, A.T.3
-
66
-
-
85033676092
-
Solving systems of algebraic equations by using grobner bases
-
J.H. Davenport, editor Springer-Verlag
-
M. Kalkbrener. Solving Systems of Algebraic Equations by Using Grobner Bases. In J.H. Davenport, editor, EUROCAL'87, volume 378 of LNCS, pages 282-291. Springer-Verlag, 1989.
-
(1989)
EUROCAL'87, Volume 378 of LNCS
, pp. 282-291
-
-
Kalkbrener, M.1
-
68
-
-
85028910917
-
Markov ciphers and differential crypt-analysis
-
D.W. Davies, editor Springer-Verlag
-
X. Lai, J.L. Massey, and S. Murphy. Markov Ciphers and Differential Crypt-analysis. In D.W. Davies, editor, Advances in Cryptology-EUROCRYPT 91, volume 547 of LNC'S, pages 17-38. Springer-Verlag, 1991.
-
(1991)
Advances in Cryptology-EUROCRYPT 91, Volume 547 of LNC'S
, pp. 17-38
-
-
Lai, X.1
Massey, J.L.2
Murphy, S.3
-
69
-
-
1442350122
-
Communications security for the twenty-first century: The advanced encryption standard
-
S. Landau. Communications Security for the Twenty-First Century: The Advanced Encryption Standard. Notices of the American Mathematical Society, 47:450-459, 2000.
-
(2000)
Notices of the American Mathematical Society
, vol.47
, pp. 450-459
-
-
Landau, S.1
-
70
-
-
0001230046
-
Standing the test of time: The data encryption standard
-
S. Landau. Standing the Test of Time: The Data Encryption Standard. Notices of the American Mathematical Society, 47:341-349, 2000.
-
(2000)
Notices of the American Mathematical Society
, vol.47
, pp. 341-349
-
-
Landau, S.1
-
71
-
-
1442328483
-
Polynomials in the nation's service: Using algebra to design the advanced encryption standard
-
S. Landau. Polynomials in the Nation's Service: Using Algebra to Design the Advanced Encryption Standard. American Mathematical Monthly, 111:89-117, 2004.
-
(2004)
American Mathematical Monthly
, vol.111
, pp. 89-117
-
-
Landau, S.1
-
72
-
-
85034440461
-
Grobner bases, gaussian elimination and resolution of systems of algebraic equations
-
J.A. van Hulzen, editor Springer-Verlag
-
D. Lazard. Grobner Bases, Gaussian Elimination and Resolution of Systems of Algebraic Equations. In J.A. van Hulzen, editor, Proceedings of the European Computer Algebra Conference on Computer Algebra, volume 162 of LNCS, pages 146-156. Springer-Verlag, 1983.
-
(1983)
Proceedings of the European Computer Algebra Conference on Computer Algebra, Volume 162 of LNCS
, pp. 146-156
-
-
Lazard, D.1
-
73
-
-
24144447286
-
Complementation-like and cyclic properties of AES round functions
-
H. Dobbertin, V. Rijmen, and A. Sowa, editors Springer-Verlag
-
T. Van Lee, R. Sparr, R. Wernsdorf, and Y. Desmedt. Complementation-like and Cyclic Properties of AES Round Functions. In H. Dobbertin, V. Rijmen, and A. Sowa, editors, Advanced Encryption Standard-AES, Fourth International Conference, volume 3373 of LNCS, pages 128-141. Springer-Verlag, 2005.
-
(2005)
Advanced Encryption Standard-AES, Fourth International Conference, Volume 3373 of LNCS
, pp. 128-141
-
-
Van Lee, T.1
Sparr, R.2
Wernsdorf, R.3
Desmedt, Y.4
-
75
-
-
33748682362
-
A game of chance
-
7 June 2003
-
D. Mackenzie. A Game of Chance. New Scientist, 2398:36-39, 2003. 7 June 2003.
-
(2003)
New Scientist
, vol.2398
, pp. 36-39
-
-
MacKenzie, D.1
-
78
-
-
85025704284
-
Linear cryptanalysis method for des cipher
-
T. Helleseth, editor Springer-Verlag
-
M. Matsui. Linear Cryptanalysis Method for DES Cipher. In T. Helleseth, editor, Advances in Cryptology-EUROCRYPT '93, volume 765 of LNCS, pages 386-397. Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology-EUROCRYPT '93, Volume 765 of LNCS
, pp. 386-397
-
-
Matsui, M.1
-
79
-
-
0031232452
-
Some complexity results for polynomial ideals
-
E.W. Mayr. Some Complexity R.esults for Polynomial Ideals. Journal of Complexity, 13(3):303-325, 1997.
-
(1997)
Journal of Complexity
, vol.13
, Issue.3
, pp. 303-325
-
-
Mayr, E.W.1
-
81
-
-
25844446805
-
On the method of XL and its inefficiency against TTM
-
T. Moh. On the Method of XL and its Inefficiency against TTM. Cryptology ePrint Archive 2001/047, 2001. http://eprint.iacr.org/2001/047/.
-
(2001)
Cryptology EPrint Archive
, vol.2001
, pp. 047
-
-
Moh, T.1
-
82
-
-
35048890615
-
On some weak extensions of AES and BES
-
J. Lopez, S. Qinq, and E. Okhamoto, editors Springer-Verlag
-
J. Monnerat and S. Vaudenay. On some Weak Extensions of AES and BES. In J. Lopez, S. Qinq, and E. Okhamoto, editors, Sixth International Conference on Information and Communications Security, volume 3269 of LNCS, pages 414-426. Springer-Verlag, 2004.
-
(2004)
Sixth International Conference on Information and Communications Security, Volume 3269 of LNCS
, pp. 414-426
-
-
Monnerat, J.1
Vaudenay, S.2
-
83
-
-
85032513290
-
Cycle structures of the des with weak and semi-weak keys
-
A.M. Odlyzko, editor Springer-Verlag
-
J.H. Moore and G.J. Simmons. Cycle Structures of the DES with Weak and Semi-Weak Keys. In A.M. Odlyzko, editor, Advances in Cryptology-CRYPTO '86, volume 263 of LNCS, pages 9-32. Springer-Verlag, 1987.
-
(1987)
Advances in Cryptology-CRYPTO '86, Volume 263 of LNCS
, pp. 9-32
-
-
Moore, J.H.1
Simmons, G.J.2
-
84
-
-
33746002680
-
An analysis of SAFER
-
S. Murphy. An Analysis of SAFER. Journal of Cryptology, 11:235-251, 1998.
-
(1998)
Journal of Cryptology
, vol.11
, pp. 235-251
-
-
Murphy, S.1
-
86
-
-
35048881860
-
-
Technical Report RHUL-MA-2006-3, Royal Holloway, University of London
-
S. Murphy, F. Piper, M. Walker, and P. Wild. Maximum Likelihood Estimation for Block Cipher Keys. Technical Report RHUL-MA-2006-3, Royal Holloway, University of London, 1994. http://www.ma.rhul.ac.uk/techreports/.
-
(1994)
Maximum Likelihood Estimation for Block Cipher Keys
-
-
Murphy, S.1
Piper, F.2
Walker, M.3
Wild, P.4
-
89
-
-
84937413721
-
Essential algebraic structure within the AES
-
M. Yung, editor Springer-Verlag
-
S. Murphy and M.J.B. Robshaw. Essential Algebraic Structure Within the AES. In M. Yung, editor, Advances in Cryptology-CRYPTO 2002, volume 2442 of LNCS, pages 1-16. Springer-Verlag, 2002.
-
(2002)
Advances in Cryptology-CRYPTO 2002, Volume 2442 of LNCS
, pp. 1-16
-
-
Murphy, S.1
Robshaw, M.J.B.2
-
90
-
-
33645592232
-
Comments on the security of the AES and the XSL technique
-
S. Murphy and M.J.B. Robshaw. Comments on the Security of the AES and the XSL Technique. Electronic Letters, 39:26-38, 2003.
-
(2003)
Electronic Letters
, vol.39
, pp. 26-38
-
-
Murphy, S.1
Robshaw, M.J.B.2
-
91
-
-
84984576304
-
A simplified AES algorithm and its linear and differential cryptanalysis
-
M.A. Musa, E.F. Schaefer, and S. Wedig. A Simplified AES Algorithm and its Linear and Differential Cryptanalysis. Cryptologia, XXVII (2):148-177, 2003.
-
(2003)
Cryptologia
, vol.27
, Issue.2
, pp. 148-177
-
-
Musa, M.A.1
Schaefer, E.F.2
Wedig, S.3
-
98
-
-
84962968104
-
Differentially uniform mappings for cryptography
-
T. Helle-seth, editor Springer-Verlag
-
K. Nyberg. Differentially Uniform Mappings for Cryptography. In T. Helle-seth, editor, Advances in Cryptology-EUROCRYPT '93, volume 765 of LNCS, pages 55-64. Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology-EUROCRYPT '93, Volume 765 of LNCS
, pp. 55-64
-
-
Nyberg, K.1
-
99
-
-
0029632010
-
Provable security against a differential attack
-
K. Nyberg and L.R. Knudsen. Provable Security Against a Differential Attack. Journal of Cryptology, 8(l):27-38, 1995.
-
(1995)
Journal of Cryptology
, vol.8
, Issue.1
, pp. 27-38
-
-
Nyberg, K.1
Knudsen, L.R.2
-
100
-
-
84947932132
-
Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms
-
U. Maurer, editor Spinger-Verlag
-
J. Patarin. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms. In U. Maurer, editor, Advances in Cryptology-EUROCRYPT '96, volume 1070 of LNCS, pages 33-48. Spinger-Verlag, 1996.
-
(1996)
Advances in Cryptology-EUROCRYPT '96, Volume 1070 of LNCS
, pp. 33-48
-
-
Patarin, J.1
-
101
-
-
84957699140
-
Imprimitive permutation groups and trapdoors in iterated block ciphers
-
L.R. Knudsen, editor Springer-Verlag
-
K.G. Paterson. Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers. In L.R. Knudsen, editor, Fast Software Encryption 1999, volume 1636 of LNCS, pages 201-214. Springer-Verlag, 1999.
-
(1999)
Fast Software Encryption 1999, Volume 1636 of LNCS
, pp. 201-214
-
-
Paterson, K.G.1
-
102
-
-
84984570847
-
Mini advanced encryption standard (Mini-AES): A testbed for cryptanalysis students
-
R.C.-W. Phan. Mini Advanced Encryption Standard (Mini-AES): A Testbed for Cryptanalysis Students. Cryptologia, XXVI (4):283-306, 2002.
-
(2002)
Cryptologia
, vol.26
, Issue.4
, pp. 283-306
-
-
Phan, R.C.-W.1
-
103
-
-
0042715199
-
How easy is collision search? Application to des
-
J-J. Quisquater and J. Vandewalle, editors Springer-Verlag
-
J-J. Quisquater and J-P. Delescaille. How Easy is Collision Search? Application to DES. In J-J. Quisquater and J. Vandewalle, editors, Advances in Cryptology-EUROCRYPT '89, volume 434 of LNCS, pages 429-434. Springer-Verlag, 1990.
-
(1990)
Advances in Cryptology-EUROCRYPT '89, Volume 434 of LNCS
, pp. 429-434
-
-
Quisquater, J.-J.1
Delescaille, J.-P.2
-
104
-
-
50049107054
-
How easy is collision search? New results and applications to des
-
G. Brassard, editor Springer-Verlag
-
J-J. Quisquater and J-P. Delescaille. How Easy is Collision Search? New Results and Applications to DES. In G. Brassard, editor, Advances in Cryptology-CRYPTO '89, volume 435 of LNCS, pages 408-413. Springer-Verlag, 1990.
-
(1990)
Advances in Cryptology-CRYPTO '89, Volume 435 of LNCS
, pp. 408-413
-
-
Quisquater, J.-J.1
Delescaille, J.-P.2
-
105
-
-
24144476253
-
More dual Rijndaels
-
H. Dobbertin, V. Rijmen, and A. Sowa, editors Springer-Verlag
-
H. Raddum. More Dual Rijndaels. In H. Dobbertin, V. Rijmen, and A. Sowa, editors, Advanced Encryption Standard-AES, Fourth International Conference, volume 3373 of LNCS, pages 142-147. Springer-Verlag, 2005.
-
(2005)
Advanced Encryption Standard-AES, Fourth International Conference, Volume 3373 of LNCS
, pp. 142-147
-
-
Raddum, H.1
-
106
-
-
85034665631
-
DES has no per round linear factors
-
G.R Blakely and D. Chaum, editors Springer-Verlag
-
J.A. Reeds and J.L. Manfredelli. DES has no Per Round Linear Factors. In G.R Blakely and D. Chaum, editors, Advances in Cryptology-Proceedings of CRYPTO 84, volume 196 of LNCS, pages 377-389. Springer-Verlag, 1985.
-
(1985)
Advances in Cryptology-Proceedings of CRYPTO 84, Volume 196 of LNCS
, pp. 377-389
-
-
Reeds, J.A.1
Manfredelli, J.L.2
-
108
-
-
84958979426
-
The cipher SHARK
-
D. Gollman, editor Springer-Verlag
-
V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers, and E. De Win. The Cipher SHARK. In D. Gollman, editor, Fast Software Encryption 1996, volume 1039 of LNCS, pages 99-112. Springer-Verlag, 1996.
-
(1996)
Fast Software Encryption 1996, Volume 1039 of LNCS
, pp. 99-112
-
-
Rijmen, V.1
Daemen, J.2
Preneel, B.3
Bosselaers, A.4
De Win, E.5
-
109
-
-
0020928825
-
Cryptanalysis of the data encryption standard by the method of formal coding
-
T. Beth, editor Springer-Verlag
-
I. Schaumueller-Bichl. Cryptanalysis of the Data Encryption Standard by the Method of Formal Coding. In T. Beth, editor, Proceedings of Workshop on Cryptography, Berg Fuerstein, Germany 1982 (EUROCRYPT 82), volume 143 of LNCS, pages 235-255. Springer-Verlag, 1983.
-
(1983)
Proceedings of Workshop on Cryptography, Berg Fuerstein, Germany 1982 (EUROCRYPT 82), Volume 143 of LNCS
, pp. 235-255
-
-
Schaumueller-Bichl, I.1
-
112
-
-
0037183939
-
Crucial Cipher Flawed, cryptographers claim
-
27 September 2002
-
C. Seife. Crucial Cipher Flawed, Cryptographers Claim. Science, 297:2193, 2002. 27 September 2002.
-
(2002)
Science
, vol.297
, pp. 2193
-
-
Seife, C.1
-
113
-
-
84890522850
-
Communication theory of secrecy systems
-
C.E.Shannon. Communication Theory of Secrecy Systems. Bell System Technical Journal, 28-4:656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
114
-
-
84957673653
-
Quadratic relation of S-box and its application to the linear attack of full round des
-
H. Krawczyk, editor Springer-Verlag
-
T. Shimoyama and T. Kaneko. Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES. In H. Krawczyk, editor, Advances in Cryptology-CRYPTO '98, volume 1462 of LNCS, pages 200-211. Springer-Verlag, 1998.
-
(1998)
Advances in Cryptology-CRYPTO '98, Volume 1462 of LNCS
, pp. 200-211
-
-
Shimoyama, T.1
Kaneko, T.2
-
115
-
-
84895414869
-
Computing grobner bases with linear algebra
-
Institute Henri Poincare, Paris
-
A. Steel. Computing Grobner Bases with Linear Algebra. Algebraic Geometry and Number Theory with MAGMA, Institute Henri Poincare, Paris, 2004.
-
(2004)
Algebraic Geometry and Number Theory with MAGMA
-
-
Steel, A.1
-
116
-
-
24144492702
-
An algebraic interpretation of AES-128
-
H. Dob-bertin, V. Rijmen, and A. Sowa, editors Springer-Verlag
-
I. Toli and A. Zanoni. An Algebraic Interpretation of AES-128. In H. Dob-bertin, V. Rijmen, and A. Sowa, editors, Advanced Encryption Standard-AES, Fourth International Conference, volume 3373 of LNCS, pages 84-97. Springer-Verlag, 2005.
-
(2005)
Advanced Encryption Standard-AES, Fourth International Conference, Volume 3373 of LNCS
, pp. 84-97
-
-
Toli, I.1
Zanoni, A.2
-
117
-
-
33745625665
-
Towards a unifying view of block cipher cryptanalysis
-
B. Roy and W. Meier, editors Springer-Verlag
-
D. Wagner. Towards a Unifying View of Block Cipher Cryptanalysis. In B. Roy and W. Meier, editors, Fast Software Encryption 2004, volume 3017 of LNCS, pages 16-33. Springer-Verlag, 2004.
-
(2004)
Fast Software Encryption 2004, Volume 3017 of LNCS
, pp. 16-33
-
-
Wagner, D.1
-
118
-
-
85048642652
-
The one-round functions of the des generate the alternating group
-
R.A. Rueppel, editor Springer-Verlag
-
R. Wernsdorf. The One-Round Functions of the DES Generate the Alternating Group. In R.A. Rueppel, editor, Advances in Cryptology-EUROCRYPT 1992, volume 658 of LNCS, pages 99-112. Springer-Verlag, 1993.
-
(1993)
Advances in Cryptology-EUROCRYPT 1992, Volume 658 of LNCS
, pp. 99-112
-
-
Wernsdorf, R.1
-
119
-
-
84949439514
-
The round functions of RIINDAEL generate the alternating group
-
J. Daemen and V. Rijmen, editors Springer-Verlag
-
R. Wernsdorf. The Round Functions of RI.INDAEL Generate the Alternating Group. In J. Daemen and V. Rijmen, editors, Fast Software Encryption 2002, volume 2365 of LNCS, pages 143-148. Springer-Verlag, 2002.
-
(2002)
Fast Software Encryption 2002, Volume 2365 of LNCS
, pp. 143-148
-
-
Wernsdorf, R.1
-
120
-
-
17444410320
-
Affine equivalence in the AES round function
-
A.M. Youssef and S.E. Tavares. Affine Equivalence in the AES Round Function. Discrete Applied Mathematics, 148(2):161-170, 2005.
-
(2005)
Discrete Applied Mathematics
, vol.148
, Issue.2
, pp. 161-170
-
-
Youssef, A.M.1
Tavares, S.E.2
|