General Principles of Algebraic Attacks and New Design Criteria for Cipher Components (original) (raw)
Related papers
General Principles of Algebraic Attacks and New Design Criteria for Components of Symmetric Ciphers
AES 4 Conference, Bonn May 10-12 2004, LNCS 3373, 2005
A survey of attacks on multivariate cryptosystems
2005
Rewriting variables: The complexity of fast algebraic attacks on stream ciphers
Advances in CryptologyCRYPTO 2004, 2004
Comparative Study of Algebraic Attacks
IARJSET, 2016
Algebraic Attacks and Decomposition of Boolean Functions
Lecture Notes in Computer Science, 2004
2000
Groups – Complexity – Cryptology, 2009
Some Algebraic Aspects of the Advanced Encryption Standard
2004
Algebraic cryptography: new constructions and their security against provable break
St. Petersburg Mathematical Journal, 2009
Attacks on Block Ciphers of Low Algebraic Degree
Journal of Cryptology, 2001
Security and Communication Networks, 2019
Counting equations in algebraic attacks on block ciphers
International Journal of Information Security, 2010
Fast Algebraic Attacks on Stream Ciphers With Linear Feedback
Advances in Cryptology-CRYPTO 2003, 2003
Computational and Algebraic Aspects of the Advanced Encryption Standard
Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction
IEEE Transactions on Information Theory, 2006
An Improvement of Linearization-Based Algebraic Attacks
Lecture Notes in Computer Science, 2011
2005
On Some Necessary Conditions of Boolean Functions to Resist Algebraic Attacks
2006
On multivariate signature-only public key cryptosystems
IACR Cryptology ePrint Archive, 2001
IEEE Transactions on Information Theory, 1998
Differential Cryptanalysis for Multivariate Schemes
Lecture Notes in Computer Science, 2005
CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited
Notion of Algebraic Immunity and Its Evaluation Related to Fast Algebraic Attacks
BFCA'06, 2007
Information Security and Cryptology, 2021
Polynomial Schemes such as HFE, Quartz and Sflash. …, 2004
The Inverse S-Box, Non-Linear Polynomial Relations and Cryptanalysis of Block Ciphers
Advanced Encryption StandardAES, 2005
IACR Cryptol. ePrint Arch., 2018
On selection of samples in algebraic attacks and a new technique to find hidden low degree equations
International Journal of Information Security, 2015
2013
Encyclopedia of Cryptography and Security, 2011
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier
Advances in Cryptology - ASIACRYPT 2013, 2013
How Fast Can Be Algebraic Attacks on Block Ciphers
online proceedings of Dagstuhl Seminar
On the implementation of new symmetric ciphers based on non-bijective multivariate maps
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems