메뉴 건너뛰기




Volumn , Issue , 2006, Pages 1-145

Algebraic aspects of the advanced encryption standard

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84895289942     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-0-387-36842-9     Document Type: Book
Times cited : (45)

References (120)
  • 1
    • 33645600432 scopus 로고    scopus 로고
    • On the use of GF-inversion as a cryptographic primitive
    • M. Matsui and R. Zuccherato, editors Springer-Verlag
    • K. Aoki and S. Vaudenay. On the Use of GF-Inversion as a Cryptographic Primitive. In M. Matsui and R. Zuccherato, editors, Selected Areas in Cryptography (SAC) 2003, volume 3006 of LNCS, pages 234-347. Springer-Verlag, 2004.
    • (2004) Selected Areas in Cryptography (SAC) 2003, Volume 3006 of LNCS , pp. 234-347
    • Aoki, K.1    Vaudenay, S.2
  • 5
    • 84963657544 scopus 로고    scopus 로고
    • On the complexity of a grobner basis algorithm
    • M. Bardet. On the Complexity of a Grobner Basis Algorithm. Algorithms Seminar 2002-2004, INRIA, 2005. http://algo.inria.fr/seminars.
    • (2005) Algorithms Seminar 2002-2004, INRIA
    • Bardet, M.1
  • 8
    • 80052787224 scopus 로고    scopus 로고
    • The book of Rijndaels
    • E. Barkan and E. Biham. The Book of Rijndaels. Cryptology ePrint Archive 2002/158, 2002. http://eprint.iacr.org/2002/158/.
    • (2002) Cryptology EPrint Archive , vol.2002 , Issue.158
    • Barkan, E.1    Biham, E.2
  • 10
    • 0026397734 scopus 로고
    • Differential cryptanalysis of DES-like cryptosys-tems
    • E. Biham and A. Shamir. Differential Cryptanalysis of DES-like Cryptosys-tems. Journal of Cryptology, 4:3-72, 1993.
    • (1993) Journal of Cryptology , vol.4 , pp. 3-72
    • Biham, E.1    Shamir, A.2
  • 16
    • 85034623360 scopus 로고
    • Cryptanalysis of des with a reduced number of rounds
    • H.C. Williams, editor Springer-Verlag
    • D. Chaum and J-H. Evertse. Cryptanalysis of DES with a Reduced Number of Rounds. In H.C. Williams, editor, Advances in Cryptology-CRYPTO '85, volume 218 of LNCS, pages 192-211. Springer-Verlag, 1986.
    • (1986) Advances in Cryptology-CRYPTO '85, Volume 218 of LNCS , pp. 192-211
    • Chaum, D.1    Evertse, J.-H.2
  • 17
    • 33646811417 scopus 로고    scopus 로고
    • On asymptotic security estimates in XL and grobner bases-related algebraic cryptanalysis
    • J. Lopez, S. Qing, and E. Okhamoto, editors Springer-Verlag
    • J-M. Chen, N. Courtois, and B-Y. Yang. On Asymptotic Security Estimates in XL and Grobner Bases-Related Algebraic Cryptanalysis. In J. Lopez, S. Qing, and E. Okhamoto, editors, ICICS, volume 3269 of LNCS, pages 401-413. Springer-Verlag, 2004.
    • (2004) ICICS, Volume 3269 of LNCS , pp. 401-413
    • Chen, J.-M.1    Courtois, N.2    Yang, B.-Y.3
  • 24
    • 84978995497 scopus 로고
    • The real reason for Rivest's phenomenon
    • H.C. Williams, editor Springer-Verlag
    • D. Coppersmith. The Real Reason for Rivest's Phenomenon. In H.C. Williams, editor, Advances in Cryptology-CRYPTO '85, volume 218 of LNCS, pages 535-536. Springer-Verlag, 1986.
    • (1986) Advances in Cryptology-CRYPTO '85, Volume 218 of LNCS , pp. 535-536
    • Coppersmith, D.1
  • 26
    • 35048866377 scopus 로고    scopus 로고
    • fc): Applications to HFE challenge 2 and Sflash-v2
    • F. Bao, R. Deng, and J. Zhou, editor Springer-Verlag
    • fc): Applications to HFE Challenge 2 and Sflash-v2. In F. Bao, R. Deng, and J. Zhou, editor, Public Key Cryptography-PKC 2004, volume 2947 of LNCS, pages 201-217. Springer-Verlag, 2004.
    • (2004) Public Key Cryptography-PKC 2004, Volume 2947 of LNCS , pp. 201-217
    • Courtois, N.1
  • 27
    • 85086684103 scopus 로고    scopus 로고
    • The inverse S-box, non-linear polynomial relations and crypt-analysis of block ciphers
    • V. Rijmen H. Dobbertin and A. Sowa, editors Springer-Verlag
    • N. Courtois. The Inverse S-Box, Non-linear Polynomial Relations and Crypt-analysis of Block Ciphers. In V. Rijmen H. Dobbertin and A. Sowa, editors, Advanced Encryption Standard-AES, Fourth International Conference, volume 3373 of LNCS, pages 234-347. Springer-Verlag, 2005.
    • (2005) Advanced Encryption Standard-AES, Fourth International Conference, Volume 3373 of LNCS , pp. 234-347
    • Courtois, N.1
  • 28
    • 77649327985 scopus 로고    scopus 로고
    • Efficient algorithms for solving overdefined systems of multivariate polynomial equations
    • B. Pre-neel, editor Springer-Verlag
    • N. Courtois, A. Klimov, J. Patarin, and A. Shamir. Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. In B. Pre-neel, editor, Advances in Cryptology-EUROCRYPT 2000, volume 1807 of LNCS, pages 392-407. Springer-Verlag, 2000.
    • (2000) Advances in Cryptology-EUROCRYPT 2000, Volume 1807 of LNCS , pp. 392-407
    • Courtois, N.1    Klimov, A.2    Patarin, J.3    Shamir, A.4
  • 29
    • 35248820612 scopus 로고    scopus 로고
    • Algebraic attacks on stream ciphers with linear feedback
    • E. Biham, editor Springer-Verlag
    • N. Courtois and W. Meier. Algebraic Attacks on Stream Ciphers with Linear Feedback. In E. Biham, editor, Advances in Cryptology-EUROCRYPT 2003, volume 2656 of LNCS, pages 345-359. Springer-Verlag, 2003.
    • (2003) Advances in Cryptology-EUROCRYPT 2003, Volume 2656 of LNCS , pp. 345-359
    • Courtois, N.1    Meier, W.2
  • 30
    • 33646819587 scopus 로고    scopus 로고
    • About the XL algorithm over GF(2)
    • M. Joye, editor Springer-Verlag
    • N. Courtois and J. Patarin. About the XL Algorithm over GF(2). In M. Joye, editor, Progress in Cryptology-CT-RSA 2003, pages 140-156. Springer-Verlag, 2003.
    • (2003) Progress in Cryptology-CT-RSA 2003 , pp. 140-156
    • Courtois, N.1    Patarin, J.2
  • 31
    • 0347313908 scopus 로고    scopus 로고
    • Cryptanalysis of block ciphers with overdefined systems of equations
    • N. Courtois and J. Piepryzk. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. Cryptology ePrint Archive 2002/044, 2002. http://eprint.iacr.org/2002/044/.
    • (2002) Cryptology EPrint Archive , vol.2002 , Issue.44
    • Courtois, N.1    Piepryzk, J.2
  • 32
    • 84958765510 scopus 로고    scopus 로고
    • Cryptanalysis of block ciphers with overdefined systems of equations
    • Y. Zheng, editor Springer-Verlag
    • N. Courtois and J. Piepryzk. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. In Y. Zheng, editor, Advances in Cryptology-ASIACRYPT 2002, volume 2501 of LNCS, pages 267-287. Springer-Verlag, 2002.
    • (2002) Advances in Cryptology-ASIACRYPT 2002, Volume 2501 of LNCS , pp. 267-287
    • Courtois, N.1    Piepryzk, J.2
  • 38
    • 84895223753 scopus 로고    scopus 로고
    • Answer to "new observations on Rijndael"
    • J. Daemen and V. Rijmen. Answer to "New Observations on Rijndael". Submission to NIST AES Process, 2000. http://csrc.nist.gov/ CryptoToolkit/aes/.
    • (2000) Submission to NIST AES Process
    • Daemen, J.1    Rijmen, V.2
  • 41
    • 24944450905 scopus 로고    scopus 로고
    • The XL-algorithm and a conjecture from commutative algebra
    • P.J. Lee, editor Springer-Verlag
    • C. Diem. The XL-Algorithm and a Conjecture from Commutative Algebra. In P.J. Lee, editor, Advances in Cryptology-ASIACRYPT 2004, volume 3329 of LAICS', pages 323-337. Springer-Verlag, 2004.
    • (2004) Advances in Cryptology-ASIACRYPT 2004, Volume 3329 of LAICS' , pp. 323-337
    • Diem, C.1
  • 43
    • 84895346417 scopus 로고    scopus 로고
    • ECRYPT Technical Report, ECRYPT Network of Excellence
    • ECRYPT. The State of the Art of AES Cryptanalysis. Technical Report, ECRYPT Network of Excellence, 2005. http://wuw.ecrypt.eu.org.
    • (2005) The State of the Art of AES Cryptanalysis
  • 44
    • 84895231315 scopus 로고    scopus 로고
    • ECRYPT. AES Lounge. Website ECRYPT Network of Excellence
    • ECRYPT. AES Lounge. Website, ECRYPT Network of Excellence, 2006. http://www.iaik.tu-graz.ac.at/research/krypto/AES/.
    • (2006)
  • 45
    • 84895206239 scopus 로고
    • Cryptanalysis of des with a reduced number of rounds
    • D. Chaum and W.L. Price, editors Springer-Verlag
    • J-H. Evertse. Cryptanalysis of DES with a Reduced Number of Rounds. In D. Chaum and W.L. Price, editors, Advances in Cryptology-EUROCRYPT 87, volume 304 of LNCS, pages 249-266. Springer-Verlag, 1988.
    • (1988) Advances in Cryptology-EUROCRYPT 87, Volume 304 of LNCS , pp. 249-266
    • Evertse, J.-H.1
  • 46
    • 0033143274 scopus 로고    scopus 로고
    • A new efficient algorithm for computing Grobner bases (F4)
    • J-C. Faugere. A New Efficient Algorithm for Computing Grobner bases (F4). Journal of Pure and Applied Algebra, 139:61-88, 1999.
    • (1999) Journal of Pure and Applied Algebra , vol.139 , pp. 61-88
    • Faugere, J.-C.1
  • 48
    • 25944479355 scopus 로고
    • Efficient computation of zero-dimensional grobner bases by change of ordering
    • J-C. Faugere, P. Gianni, D. Lazard, and T. Mora. Efficient Computation of Zero-dimensional Grobner Bases by Change of Ordering. Journal of Symbolic Computation, 16(4):329-344, 1993.
    • (1993) Journal of Symbolic Computation , vol.16 , Issue.4 , pp. 329-344
    • Faugere, J.-C.1    Gianni, P.2    Lazard, D.3    Mora, T.4
  • 49
    • 35248840150 scopus 로고    scopus 로고
    • Algebraic cryptanalysis of hidden field equation (HFE) cryptosystems using grobner bases
    • D. Boneh, editor Springer-Verlag
    • J-C. Faugere and A. Joux. Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems using Grobner Bases. In D. Boneh, editor, Advances in Cryptology-CRYPTO 2003, volume 2729 of LNCS, pages 44-60. Springer-Verlag, 2003.
    • (2003) Advances in Cryptology-CRYPTO 2003, Volume 2729 of LNCS , pp. 44-60
    • Faugere, J.-C.1    Joux, A.2
  • 50
    • 0001820140 scopus 로고
    • Cryptography and computer piracy
    • H. Feistel. Cryptography and Computer Piracy. Scientific American, 228:15-23, 1973.
    • (1973) Scientific American , vol.228 , pp. 15-23
    • Feistel, H.1
  • 55
    • 12444346059 scopus 로고    scopus 로고
    • A collision attack on 7 rounds of Rijndael
    • National Institute of Standards and Technology
    • H. Gilbert and M. Minier. A Collision Attack on 7 Rounds of Rijndael. In Proceedings of Third Advanced Encryption Standard Conference, pages 230-241. National Institute of Standards and Technology, 2000.
    • (2000) Proceedings of Third Advanced Encryption Standard Conference , pp. 230-241
    • Gilbert, H.1    Minier, M.2
  • 57
  • 58
    • 33745673169 scopus 로고    scopus 로고
    • Projective geometry over finite fields
    • Oxford University Press
    • J.W.P. Hirschfeld. Projective Geometry over Finite Fields. Oxford Mathematical Monographs. Oxford University Press, 1998.
    • (1998) Oxford Mathematical Monographs
    • Hirschfeld, J.W.P.1
  • 61
    • 84895410043 scopus 로고    scopus 로고
    • Technical Report RHUL-MA-2006-4, Royal Holloway, University of London
    • W-A. Jackson and S. Murphy. Projective Aspects of the AES Inversion. Technical Report RHUL-MA-2006-4, Royal Holloway, University of London, 2005. http://www.ma.rhul.ac.uk/techreport s/.
    • (2005) Projective Aspects of the AES Inversion
    • Jackson, W.-A.1    Murphy, S.2
  • 62
    • 27544435027 scopus 로고    scopus 로고
    • Attacks on block ciphers of low algebraic degree
    • T. Jakobsen and L. Knudsen. Attacks on Block Ciphers of Low Algebraic Degree. Journal of Cryptology, 14:197-210, 2001.
    • (2001) Journal of Cryptology , vol.14 , pp. 197-210
    • Jakobsen, T.1    Knudsen, L.2
  • 65
    • 0023863663 scopus 로고
    • Is the data encryption standard a group? (Results of Cycling Experiments on DES)
    • B.S. Kaliski, R. Rivest, and A.T. Sherman. Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES). Journal of Cryptology, 1:3-36, 1988.
    • (1988) Journal of Cryptology , vol.1 , pp. 3-36
    • Kaliski, B.S.1    Rivest, R.2    Sherman, A.T.3
  • 66
    • 85033676092 scopus 로고
    • Solving systems of algebraic equations by using grobner bases
    • J.H. Davenport, editor Springer-Verlag
    • M. Kalkbrener. Solving Systems of Algebraic Equations by Using Grobner Bases. In J.H. Davenport, editor, EUROCAL'87, volume 378 of LNCS, pages 282-291. Springer-Verlag, 1989.
    • (1989) EUROCAL'87, Volume 378 of LNCS , pp. 282-291
    • Kalkbrener, M.1
  • 69
    • 1442350122 scopus 로고    scopus 로고
    • Communications security for the twenty-first century: The advanced encryption standard
    • S. Landau. Communications Security for the Twenty-First Century: The Advanced Encryption Standard. Notices of the American Mathematical Society, 47:450-459, 2000.
    • (2000) Notices of the American Mathematical Society , vol.47 , pp. 450-459
    • Landau, S.1
  • 70
    • 0001230046 scopus 로고    scopus 로고
    • Standing the test of time: The data encryption standard
    • S. Landau. Standing the Test of Time: The Data Encryption Standard. Notices of the American Mathematical Society, 47:341-349, 2000.
    • (2000) Notices of the American Mathematical Society , vol.47 , pp. 341-349
    • Landau, S.1
  • 71
    • 1442328483 scopus 로고    scopus 로고
    • Polynomials in the nation's service: Using algebra to design the advanced encryption standard
    • S. Landau. Polynomials in the Nation's Service: Using Algebra to Design the Advanced Encryption Standard. American Mathematical Monthly, 111:89-117, 2004.
    • (2004) American Mathematical Monthly , vol.111 , pp. 89-117
    • Landau, S.1
  • 75
    • 33748682362 scopus 로고    scopus 로고
    • A game of chance
    • 7 June 2003
    • D. Mackenzie. A Game of Chance. New Scientist, 2398:36-39, 2003. 7 June 2003.
    • (2003) New Scientist , vol.2398 , pp. 36-39
    • MacKenzie, D.1
  • 78
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for des cipher
    • T. Helleseth, editor Springer-Verlag
    • M. Matsui. Linear Cryptanalysis Method for DES Cipher. In T. Helleseth, editor, Advances in Cryptology-EUROCRYPT '93, volume 765 of LNCS, pages 386-397. Springer-Verlag, 1994.
    • (1994) Advances in Cryptology-EUROCRYPT '93, Volume 765 of LNCS , pp. 386-397
    • Matsui, M.1
  • 79
    • 0031232452 scopus 로고    scopus 로고
    • Some complexity results for polynomial ideals
    • E.W. Mayr. Some Complexity R.esults for Polynomial Ideals. Journal of Complexity, 13(3):303-325, 1997.
    • (1997) Journal of Complexity , vol.13 , Issue.3 , pp. 303-325
    • Mayr, E.W.1
  • 81
    • 25844446805 scopus 로고    scopus 로고
    • On the method of XL and its inefficiency against TTM
    • T. Moh. On the Method of XL and its Inefficiency against TTM. Cryptology ePrint Archive 2001/047, 2001. http://eprint.iacr.org/2001/047/.
    • (2001) Cryptology EPrint Archive , vol.2001 , pp. 047
    • Moh, T.1
  • 83
    • 85032513290 scopus 로고
    • Cycle structures of the des with weak and semi-weak keys
    • A.M. Odlyzko, editor Springer-Verlag
    • J.H. Moore and G.J. Simmons. Cycle Structures of the DES with Weak and Semi-Weak Keys. In A.M. Odlyzko, editor, Advances in Cryptology-CRYPTO '86, volume 263 of LNCS, pages 9-32. Springer-Verlag, 1987.
    • (1987) Advances in Cryptology-CRYPTO '86, Volume 263 of LNCS , pp. 9-32
    • Moore, J.H.1    Simmons, G.J.2
  • 84
    • 33746002680 scopus 로고    scopus 로고
    • An analysis of SAFER
    • S. Murphy. An Analysis of SAFER. Journal of Cryptology, 11:235-251, 1998.
    • (1998) Journal of Cryptology , vol.11 , pp. 235-251
    • Murphy, S.1
  • 85
    • 0028676262 scopus 로고
    • A weak cipher that generates the symmetric group
    • S. Murphy, K.G. Paterson, and P. Wild. A Weak Cipher that Generates the Symmetric Group. Journal of Cryptology, 7:61-65, 1994.
    • (1994) Journal of Cryptology , vol.7 , pp. 61-65
    • Murphy, S.1    Paterson, K.G.2    Wild, P.3
  • 87
    • 84895293661 scopus 로고    scopus 로고
    • Further comments on the structure of Rijndael
    • S. Murphy and M.J.B. Robshaw. Further Comments on the Structure of Ri-jndael. Submission to NIST AES Process, 2000. http://csrc.nist.gov/ CryptoToolkit/aes/.
    • (2000) Submission to NIST AES Process
    • Murphy, S.1    Robshaw, M.J.B.2
  • 90
    • 33645592232 scopus 로고    scopus 로고
    • Comments on the security of the AES and the XSL technique
    • S. Murphy and M.J.B. Robshaw. Comments on the Security of the AES and the XSL Technique. Electronic Letters, 39:26-38, 2003.
    • (2003) Electronic Letters , vol.39 , pp. 26-38
    • Murphy, S.1    Robshaw, M.J.B.2
  • 91
    • 84984576304 scopus 로고    scopus 로고
    • A simplified AES algorithm and its linear and differential cryptanalysis
    • M.A. Musa, E.F. Schaefer, and S. Wedig. A Simplified AES Algorithm and its Linear and Differential Cryptanalysis. Cryptologia, XXVII (2):148-177, 2003.
    • (2003) Cryptologia , vol.27 , Issue.2 , pp. 148-177
    • Musa, M.A.1    Schaefer, E.F.2    Wedig, S.3
  • 98
    • 84962968104 scopus 로고
    • Differentially uniform mappings for cryptography
    • T. Helle-seth, editor Springer-Verlag
    • K. Nyberg. Differentially Uniform Mappings for Cryptography. In T. Helle-seth, editor, Advances in Cryptology-EUROCRYPT '93, volume 765 of LNCS, pages 55-64. Springer-Verlag, 1994.
    • (1994) Advances in Cryptology-EUROCRYPT '93, Volume 765 of LNCS , pp. 55-64
    • Nyberg, K.1
  • 99
    • 0029632010 scopus 로고
    • Provable security against a differential attack
    • K. Nyberg and L.R. Knudsen. Provable Security Against a Differential Attack. Journal of Cryptology, 8(l):27-38, 1995.
    • (1995) Journal of Cryptology , vol.8 , Issue.1 , pp. 27-38
    • Nyberg, K.1    Knudsen, L.R.2
  • 100
    • 84947932132 scopus 로고    scopus 로고
    • Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms
    • U. Maurer, editor Spinger-Verlag
    • J. Patarin. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms. In U. Maurer, editor, Advances in Cryptology-EUROCRYPT '96, volume 1070 of LNCS, pages 33-48. Spinger-Verlag, 1996.
    • (1996) Advances in Cryptology-EUROCRYPT '96, Volume 1070 of LNCS , pp. 33-48
    • Patarin, J.1
  • 101
    • 84957699140 scopus 로고    scopus 로고
    • Imprimitive permutation groups and trapdoors in iterated block ciphers
    • L.R. Knudsen, editor Springer-Verlag
    • K.G. Paterson. Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers. In L.R. Knudsen, editor, Fast Software Encryption 1999, volume 1636 of LNCS, pages 201-214. Springer-Verlag, 1999.
    • (1999) Fast Software Encryption 1999, Volume 1636 of LNCS , pp. 201-214
    • Paterson, K.G.1
  • 102
    • 84984570847 scopus 로고    scopus 로고
    • Mini advanced encryption standard (Mini-AES): A testbed for cryptanalysis students
    • R.C.-W. Phan. Mini Advanced Encryption Standard (Mini-AES): A Testbed for Cryptanalysis Students. Cryptologia, XXVI (4):283-306, 2002.
    • (2002) Cryptologia , vol.26 , Issue.4 , pp. 283-306
    • Phan, R.C.-W.1
  • 103
    • 0042715199 scopus 로고
    • How easy is collision search? Application to des
    • J-J. Quisquater and J. Vandewalle, editors Springer-Verlag
    • J-J. Quisquater and J-P. Delescaille. How Easy is Collision Search? Application to DES. In J-J. Quisquater and J. Vandewalle, editors, Advances in Cryptology-EUROCRYPT '89, volume 434 of LNCS, pages 429-434. Springer-Verlag, 1990.
    • (1990) Advances in Cryptology-EUROCRYPT '89, Volume 434 of LNCS , pp. 429-434
    • Quisquater, J.-J.1    Delescaille, J.-P.2
  • 104
    • 50049107054 scopus 로고
    • How easy is collision search? New results and applications to des
    • G. Brassard, editor Springer-Verlag
    • J-J. Quisquater and J-P. Delescaille. How Easy is Collision Search? New Results and Applications to DES. In G. Brassard, editor, Advances in Cryptology-CRYPTO '89, volume 435 of LNCS, pages 408-413. Springer-Verlag, 1990.
    • (1990) Advances in Cryptology-CRYPTO '89, Volume 435 of LNCS , pp. 408-413
    • Quisquater, J.-J.1    Delescaille, J.-P.2
  • 112
    • 0037183939 scopus 로고    scopus 로고
    • Crucial Cipher Flawed, cryptographers claim
    • 27 September 2002
    • C. Seife. Crucial Cipher Flawed, Cryptographers Claim. Science, 297:2193, 2002. 27 September 2002.
    • (2002) Science , vol.297 , pp. 2193
    • Seife, C.1
  • 113
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C.E.Shannon. Communication Theory of Secrecy Systems. Bell System Technical Journal, 28-4:656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 114
    • 84957673653 scopus 로고    scopus 로고
    • Quadratic relation of S-box and its application to the linear attack of full round des
    • H. Krawczyk, editor Springer-Verlag
    • T. Shimoyama and T. Kaneko. Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES. In H. Krawczyk, editor, Advances in Cryptology-CRYPTO '98, volume 1462 of LNCS, pages 200-211. Springer-Verlag, 1998.
    • (1998) Advances in Cryptology-CRYPTO '98, Volume 1462 of LNCS , pp. 200-211
    • Shimoyama, T.1    Kaneko, T.2
  • 115
    • 84895414869 scopus 로고    scopus 로고
    • Computing grobner bases with linear algebra
    • Institute Henri Poincare, Paris
    • A. Steel. Computing Grobner Bases with Linear Algebra. Algebraic Geometry and Number Theory with MAGMA, Institute Henri Poincare, Paris, 2004.
    • (2004) Algebraic Geometry and Number Theory with MAGMA
    • Steel, A.1
  • 117
    • 33745625665 scopus 로고    scopus 로고
    • Towards a unifying view of block cipher cryptanalysis
    • B. Roy and W. Meier, editors Springer-Verlag
    • D. Wagner. Towards a Unifying View of Block Cipher Cryptanalysis. In B. Roy and W. Meier, editors, Fast Software Encryption 2004, volume 3017 of LNCS, pages 16-33. Springer-Verlag, 2004.
    • (2004) Fast Software Encryption 2004, Volume 3017 of LNCS , pp. 16-33
    • Wagner, D.1
  • 118
    • 85048642652 scopus 로고
    • The one-round functions of the des generate the alternating group
    • R.A. Rueppel, editor Springer-Verlag
    • R. Wernsdorf. The One-Round Functions of the DES Generate the Alternating Group. In R.A. Rueppel, editor, Advances in Cryptology-EUROCRYPT 1992, volume 658 of LNCS, pages 99-112. Springer-Verlag, 1993.
    • (1993) Advances in Cryptology-EUROCRYPT 1992, Volume 658 of LNCS , pp. 99-112
    • Wernsdorf, R.1
  • 119
    • 84949439514 scopus 로고    scopus 로고
    • The round functions of RIINDAEL generate the alternating group
    • J. Daemen and V. Rijmen, editors Springer-Verlag
    • R. Wernsdorf. The Round Functions of RI.INDAEL Generate the Alternating Group. In J. Daemen and V. Rijmen, editors, Fast Software Encryption 2002, volume 2365 of LNCS, pages 143-148. Springer-Verlag, 2002.
    • (2002) Fast Software Encryption 2002, Volume 2365 of LNCS , pp. 143-148
    • Wernsdorf, R.1
  • 120
    • 17444410320 scopus 로고    scopus 로고
    • Affine equivalence in the AES round function
    • A.M. Youssef and S.E. Tavares. Affine Equivalence in the AES Round Function. Discrete Applied Mathematics, 148(2):161-170, 2005.
    • (2005) Discrete Applied Mathematics , vol.148 , Issue.2 , pp. 161-170
    • Youssef, A.M.1    Tavares, S.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.