메뉴 건너뛰기




Volumn 2501, Issue , 2002, Pages 267-287

Cryptanalysis of block ciphers with overdefined systems of equations

Author keywords

AES; Block ciphers; Camellia; Gr obner bases; MQ problem; Multivariate cryptanalysis; Multivariate quadratic equations; Overdefined systems of multivariate equations; Rijndael; Serpent; Sparse multivariate polynomials; Square; XL algorithm

Indexed keywords

ALGEBRA; LYAPUNOV METHODS; POLYNOMIALS; SECURITY OF DATA;

EID: 84958765510     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36178-2_17     Document Type: Conference Paper
Times cited : (546)

References (27)
  • 3
    • 85023205150 scopus 로고
    • Matrix multiplication via arithmetic progressions
    • Don Coppersmith, Shmuel Winograd: “Matrix multiplication via arithmetic progressions”; J. Symbolic Computation (1990), 9, pp. 251-280.
    • (1990) J. Symbolic Computation , vol.9 , pp. 251-280
    • Coppersmith, D.1    Winograd, S.2
  • 4
    • 0004181422 scopus 로고    scopus 로고
    • The latest revised version of the proposal is available on the internet
    • Joan Daemen, Vincent Rijmen: AES proposal: Rijndael; The latest revised version of the proposal is available on the internet, http://csrc.nist.gov/encryption/aes/rijndael/Rijndael.pdf
    • AES Proposal: Rijndael
    • Daemen, J.1    Rijmen, V.2
  • 5
    • 84958969583 scopus 로고    scopus 로고
    • Solving Underdefined Systems of Multivariate Quadratic Equations
    • LNCS 2254, Springer
    • Nicolas Courtois, Louis Goubin, Willi Meier, Jean-Daniel Tacier: Solving Underdefined Systems of Multivariate Quadratic Equations; PKC 2002, LNCS 2254, Springer, pp. 211-225.
    • PKC 2002 , pp. 211-225
    • Courtois, N.1    Goubin, L.2    Meier, W.3    Tacier, J.-D.4
  • 6
    • 84937560136 scopus 로고    scopus 로고
    • The security of Hidden Field Equations (HFE)
    • San Francisco 8-12 April, LNCS2020, Springer-Verlag
    • Nicolas Courtois: The security of Hidden Field Equations (HFE); Cryptographers’ Track Rsa Conference 2001, San Francisco 8-12 April 2001, LNCS2020, Springer-Verlag, pp. 266-281.
    • (2001) Cryptographers’ Track Rsa Conference 2001 , pp. 266-281
    • Courtois, N.1
  • 7
    • 0001820140 scopus 로고
    • Cryptography and computer privacy
    • May
    • Horst Feistel: Cryptography and computer privacy; Scientific American, vol. 228, No. 5, pp. 15-23, May 1973.
    • (1973) Scientific American , vol.228 , Issue.5 , pp. 15-23
    • Feistel, H.1
  • 8
    • 84949194630 scopus 로고    scopus 로고
    • A simple algebraic representation of Rijndael
    • LNCS 2259, Springer
    • Niels Ferguson, Richard Schroeppel and Doug Whiting: A simple algebraic representation of Rijndael; SAC’01, page 103, LNCS 2259, Springer.
    • SAC’01 , pp. 103
    • Ferguson, N.1    Schroeppel, R.2    Whiting, D.3
  • 10
    • 0018530910 scopus 로고
    • Structured design of substitution-permutation encryption networks;
    • J.B. Kam and G.I. Davida: Structured design of substitution-permutation encryption networks; IEEE Trans. on Computers, Vol. C-28, 1979, pp.747-753.
    • (1979) IEEE Trans on Computers , vol.28 , pp. 747-753
    • Kam, J.B.1    Davida, G.I.2
  • 11
    • 84949220397 scopus 로고    scopus 로고
    • On the Decorrelated Fast Cipher (DFC) and its Theory
    • Springer, LNCS 1636
    • Lars R. Knudsen, Vincent Rijmen: On the Decorrelated Fast Cipher (DFC) and its Theory; FSE’99, Springer, LNCS 1636, pp. 81-94.
    • FSE’99 , pp. 81-94
    • Knudsen, L.R.1    Rijmen, V.2
  • 12
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions;
    • April
    • Michael Luby, Charles W. Rackoff, How to construct pseudorandom permutations from pseudorandom functions;, SIAM Journal on Computing, vol. 17, n. 2, pp. 373-386, April 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.W.2
  • 15
    • 0003064824 scopus 로고    scopus 로고
    • On the construction of pseudo-random permutations: Luby-Rackoff revisited
    • Moni Naor and Omer Reingold: On the construction of pseudo-random permutations: Luby-Rackoff revisited; Journal of Cryptology, vol 12, 1999, pp. 29-66.
    • (1999) Journal of Cryptology , vol.12 , pp. 29-66
    • Naor, M.1    Reingold, O.2
  • 16
    • 84962968104 scopus 로고    scopus 로고
    • Differentially Uniform Mappings for Cryptography
    • LNCS 765, Springer
    • Kaisa Nyberg: Differentially Uniform Mappings for Cryptography; Eurocrypt’93, LNCS 765, Springer, pp. 55-64.
    • Eurocrypt’93 , pp. 55-64
    • Nyberg, K.1
  • 17
    • 84957640013 scopus 로고    scopus 로고
    • Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt’88
    • Springer-Verlag
    • Jacques Patarin: Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt’88; Crypto’95, Springer-Verlag, pp. 248-261.
    • Crypto’95 , pp. 248-261
    • Patarin, J.1
  • 18
    • 84946837966 scopus 로고    scopus 로고
    • Generic Attacks on Feistel Schemes;
    • LNCS 2248, Springer
    • Jacques Patarin: Generic Attacks on Feistel Schemes; Asiacrypt 2001, LNCS 2248, Springer, pp. 222-238.
    • Asiacrypt 2001 , pp. 222-238
    • Patarin, J.1
  • 19
    • 84947932132 scopus 로고    scopus 로고
    • Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two new families of Asymmetric Algorithms
    • Springer Verlag
    • Jacques Patarin: Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of Asymmetric Algorithms; in Eurocrypt’96, Springer Verlag, pp. 33-48.
    • Eurocrypt’96 , pp. 33-48
    • Patarin, J.1
  • 21
    • 84945121465 scopus 로고    scopus 로고
    • Structural Cryptanalysis of SASAS
    • LNCS 2045, Springer
    • Adi Shamir, Alex Biryukov: Structural Cryptanalysis of SASAS; Eurocrypt 2001, LNCS 2045, Springer, pp. 394-405.
    • Eurocrypt 2001 , pp. 394-405
    • Shamir, A.1    Biryukov, A.2
  • 23
    • 0037681368 scopus 로고    scopus 로고
    • Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations
    • LNCS1807, Springer
    • Adi Shamir, Jacques Patarin, Nicolas Courtois, Alexander Klimov, Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations, Eurocrypt’2000, LNCS 1807, Springer, pp. 392-407.
    • Eurocrypt’2000 , pp. 392-407
    • Shamir, A.1    Patarin, J.2    Courtois, N.3    Klimov, A.4
  • 25
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • see inpatricular
    • Claude Elwood Shannon: Communication theory of secrecy systems;, Bell System Technical Journal 28 (1949), see in patricular page 704.
    • (1949) Bell System Technical Journal , vol.28 , pp. 704
    • Shannon, C.E.1
  • 27
    • 84937409797 scopus 로고    scopus 로고
    • On the Pseudorandomness of Top-Level Schemes of Block Ciphers
    • LNCS 1976, Springer
    • Serge Vaudenay, Shiho Moriai: On the Pseudorandomness of Top-Level Schemes of Block Ciphers; Asiacrypt 2000, LNCS 1976, Springer, pp. 289-302.
    • Asiacrypt 2000 , pp. 289-302
    • Vaudenay, S.1    Moriai, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.