General Principles of Algebraic Attacks and New Design Criteria for Cipher Components (original) (raw)

General Principles of Algebraic Attacks and New Design Criteria for Components of Symmetric Ciphers

Nicolas T. Courtois

AES 4 Conference, Bonn May 10-12 2004, LNCS 3373, 2005

View PDFchevron_right

A survey of attacks on multivariate cryptosystems

Adam Feldmann

2005

View PDFchevron_right

Rewriting variables: The complexity of fast algebraic attacks on stream ciphers

P. Hawkes

Advances in Cryptology–CRYPTO 2004, 2004

View PDFchevron_right

Comparative Study of Algebraic Attacks

Ahmed Abdel-Hafez

IARJSET, 2016

View PDFchevron_right

Algebraic Attacks and Decomposition of Boolean Functions

Enes Pasalic

Lecture Notes in Computer Science, 2004

View PDFchevron_right

Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes

Nicolas Courtois

2000

View PDFchevron_right

Algebraic Attacks Galore!

Martin Kreuzer

Groups – Complexity – Cryptology, 2009

View PDFchevron_right

Some Algebraic Aspects of the Advanced Encryption Standard

carlos cid

2004

View PDFchevron_right

Algebraic cryptography: new constructions and their security against provable break

A. Kojevnikov

St. Petersburg Mathematical Journal, 2009

View PDFchevron_right

Attacks on Block Ciphers of Low Algebraic Degree

Lars Knudsen

Journal of Cryptology, 2001

View PDFchevron_right

On the Constructions of New Symmetric Ciphers Based on Nonbijective Multivariate Maps of Prescribed Degree

Aneta Wroblewska

Security and Communication Networks, 2019

View PDFchevron_right

Counting equations in algebraic attacks on block ciphers

Lars Knudsen

International Journal of Information Security, 2010

View PDFchevron_right

Fast Algebraic Attacks on Stream Ciphers With Linear Feedback

Nicolas T. Courtois

Advances in Cryptology-CRYPTO 2003, 2003

View PDFchevron_right

Computational and Algebraic Aspects of the Advanced Encryption Standard

carlos cid

View PDFchevron_right

Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction

Kishan Gupta

IEEE Transactions on Information Theory, 2006

View PDFchevron_right

An Improvement of Linearization-Based Algebraic Attacks

Abhijit Abhik Das

Lecture Notes in Computer Science, 2011

View PDFchevron_right

Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity

Kishan Gupta

2005

View PDFchevron_right

On Some Necessary Conditions of Boolean Functions to Resist Algebraic Attacks

Deepak Kumar Dalai

2006

View PDFchevron_right

On multivariate signature-only public key cryptosystems

Nicolas Courtois

IACR Cryptology ePrint Archive, 2001

View PDFchevron_right

On algebraic immunity of Maiorana-McFarland like functions and applications of algebraic attacks to some stream cipher schemes

Enes Pasalic

IEEE Transactions on Information Theory, 1998

View PDFchevron_right

Differential Cryptanalysis for Multivariate Schemes

Pierre-alain Fouque

Lecture Notes in Computer Science, 2005

View PDFchevron_right

CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited

Nicolas Courtois

View PDFchevron_right

Notion of Algebraic Immunity and Its Evaluation Related to Fast Algebraic Attacks

Deepak Kumar Dalai

BFCA'06, 2007

View PDFchevron_right

Security Analysis on an ElGamal-Like Multivariate Encryption Scheme Based on Isomorphism of Polynomials

Bagus Santoso

Information Security and Cryptology, 2021

View PDFchevron_right

Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes Such As HFE, Quartz and Sflash

Nicolas Courtois

Polynomial Schemes such as HFE, Quartz and Sflash.” …, 2004

View PDFchevron_right

The Inverse S-Box, Non-Linear Polynomial Relations and Cryptanalysis of Block Ciphers

Nicolas Courtois

Advanced Encryption Standard–AES, 2005

View PDFchevron_right

On the Existence of Non-Linear Invariants and Algebraic Polynomial Constructive Approach to Backdoors in Block Ciphers

Nicolas Courtois

IACR Cryptol. ePrint Arch., 2018

View PDFchevron_right

On selection of samples in algebraic attacks and a new technique to find hidden low degree equations

Nicolas Courtois

International Journal of Information Security, 2015

View PDFchevron_right

New candidates for multivariate trapdoor functions and new multivariate public key encryption schemes

Jaiberth Porras Barrera

2013

View PDFchevron_right

Multivariate Cryptography

Louis Goubin

Encyclopedia of Cryptography and Security, 2011

View PDFchevron_right

Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier

Ivan Damgård

Advances in Cryptology - ASIACRYPT 2013, 2013

View PDFchevron_right

How Fast Can Be Algebraic Attacks on Block Ciphers

Nicolas Courtois

online proceedings of Dagstuhl Seminar

View PDFchevron_right

On the implementation of new symmetric ciphers based on non-bijective multivariate maps

Aneta Wroblewska

Proceedings of the 2018 Federated Conference on Computer Science and Information Systems

View PDFchevron_right