Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier (original) (raw)

Algebraic Attacks Galore!

Martin Kreuzer

Groups – Complexity – Cryptology, 2009

View PDFchevron_right

Comparative Study of Algebraic Attacks

Ahmed Abdel-Hafez

IARJSET, 2016

View PDFchevron_right

General Principles of Algebraic Attacks and New Design Criteria for Cipher Components

Nicolas Courtois

Advanced Encryption Standard–AES, 2005

View PDFchevron_right

Detection of Algebraic Manipulation in the Presence of Leakage

Hadi Ahmadi

Lecture Notes in Computer Science, 2014

View PDFchevron_right

Algebraic cryptography: new constructions and their security against provable break

A. Kojevnikov

St. Petersburg Mathematical Journal, 2009

View PDFchevron_right

General Principles of Algebraic Attacks and New Design Criteria for Components of Symmetric Ciphers

Nicolas T. Courtois

AES 4 Conference, Bonn May 10-12 2004, LNCS 3373, 2005

View PDFchevron_right

An Improvement of Linearization-Based Algebraic Attacks

Abhijit Abhik Das

Lecture Notes in Computer Science, 2011

View PDFchevron_right

Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes

Nicolas Courtois

2000

View PDFchevron_right

Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes Such As HFE, Quartz and Sflash

Nicolas Courtois

Polynomial Schemes such as HFE, Quartz and Sflash.” …, 2004

View PDFchevron_right

On selection of samples in algebraic attacks and a new technique to find hidden low degree equations

Nicolas Courtois

International Journal of Information Security, 2015

View PDFchevron_right

Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction

Kishan Gupta

IEEE Transactions on Information Theory, 2006

View PDFchevron_right

A polynomial time attack against algebraic geometry code based public key cryptosystems

R. Pellikaan, Alain Couvreur

2014 IEEE International Symposium on Information Theory, 2014

View PDFchevron_right

On Some Necessary Conditions of Boolean Functions to Resist Algebraic Attacks

Deepak Kumar Dalai

2006

View PDFchevron_right

A survey of attacks on multivariate cryptosystems

Adam Feldmann

2005

View PDFchevron_right

Notion of Algebraic Immunity and Its Evaluation Related to Fast Algebraic Attacks

Deepak Kumar Dalai

BFCA'06, 2007

View PDFchevron_right

Rewriting variables: The complexity of fast algebraic attacks on stream ciphers

P. Hawkes

Advances in Cryptology–CRYPTO 2004, 2004

View PDFchevron_right

Algebraic attacks using SAT-solvers

Martin Kreuzer

Groups – Complexity – Cryptology, 2010

View PDFchevron_right

Guess-and-Determine Attack and Algebraic Attack

pejman abdollahifard

2010

View PDFchevron_right

Algebraic attack on the MQQ public key cryptosystem

emam mohamed

2009

View PDFchevron_right

Key-Recovery Attacks on ASASA

Pierre-alain Fouque

Advances in Cryptology – ASIACRYPT 2015, 2015

View PDFchevron_right

Attacks on Block Ciphers of Low Algebraic Degree

Lars Knudsen

Journal of Cryptology, 2001

View PDFchevron_right

Protecting obfuscation against arithmetic attacks

Eric Miles

View PDFchevron_right

Analysis of the algebraic side channel attack

C. Carlet

View PDFchevron_right

Cryptanalysis of an authentication scheme using truncated polynomials

Arif Umar

Information Processing Letters, 2009

View PDFchevron_right

On Asymptotic Security Estimates In Xl and Gröbner Bases-Related Algebraic Cryptanalysis

Bo-yin Yang, Nicolas Courtois

Information and Communications …, 2004

View PDFchevron_right

Non-Malleable Secret Sharing against Affine Tampering

Mahdi Cheraghchi

ArXiv, 2019

View PDFchevron_right

Towards an Algebraic Attack on AES-128 Faster Than Brute-Force

Andrei Simion

2013

View PDFchevron_right

Cryptanalysis of Public-Key Cryptosystems That Use Subcodes of Algebraic Geometry Codes

Irene Márquez, Alain Couvreur, R. Pellikaan

CIM Series in Mathematical Sciences, 2015

View PDFchevron_right

A message recovery attack on multivariate polynomial trapdoor function

Saba Inam

PeerJ Computer Science

View PDFchevron_right

Algebraic Attacks and Decomposition of Boolean Functions

Enes Pasalic

Lecture Notes in Computer Science, 2004

View PDFchevron_right

CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited

Nicolas Courtois

View PDFchevron_right

On the Existence of Non-Linear Invariants and Algebraic Polynomial Constructive Approach to Backdoors in Block Ciphers

Nicolas Courtois

IACR Cryptol. ePrint Arch., 2018

View PDFchevron_right

Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity

Kishan Gupta

2005

View PDFchevron_right

Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic Eraser

Derek Atkins

arXiv (Cornell University), 2016

View PDFchevron_right