Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier (original) (raw)
Related papers
Groups – Complexity – Cryptology, 2009
Comparative Study of Algebraic Attacks
IARJSET, 2016
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
Advanced Encryption StandardAES, 2005
Detection of Algebraic Manipulation in the Presence of Leakage
Lecture Notes in Computer Science, 2014
Algebraic cryptography: new constructions and their security against provable break
St. Petersburg Mathematical Journal, 2009
General Principles of Algebraic Attacks and New Design Criteria for Components of Symmetric Ciphers
AES 4 Conference, Bonn May 10-12 2004, LNCS 3373, 2005
An Improvement of Linearization-Based Algebraic Attacks
Lecture Notes in Computer Science, 2011
2000
Polynomial Schemes such as HFE, Quartz and Sflash. …, 2004
On selection of samples in algebraic attacks and a new technique to find hidden low degree equations
International Journal of Information Security, 2015
Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction
IEEE Transactions on Information Theory, 2006
A polynomial time attack against algebraic geometry code based public key cryptosystems
2014 IEEE International Symposium on Information Theory, 2014
On Some Necessary Conditions of Boolean Functions to Resist Algebraic Attacks
2006
A survey of attacks on multivariate cryptosystems
2005
Notion of Algebraic Immunity and Its Evaluation Related to Fast Algebraic Attacks
BFCA'06, 2007
Rewriting variables: The complexity of fast algebraic attacks on stream ciphers
Advances in CryptologyCRYPTO 2004, 2004
Algebraic attacks using SAT-solvers
Groups – Complexity – Cryptology, 2010
Guess-and-Determine Attack and Algebraic Attack
2010
Algebraic attack on the MQQ public key cryptosystem
2009
Advances in Cryptology – ASIACRYPT 2015, 2015
Attacks on Block Ciphers of Low Algebraic Degree
Journal of Cryptology, 2001
Protecting obfuscation against arithmetic attacks
Analysis of the algebraic side channel attack
Cryptanalysis of an authentication scheme using truncated polynomials
Information Processing Letters, 2009
On Asymptotic Security Estimates In Xl and Gröbner Bases-Related Algebraic Cryptanalysis
Information and Communications …, 2004
Non-Malleable Secret Sharing against Affine Tampering
ArXiv, 2019
Towards an Algebraic Attack on AES-128 Faster Than Brute-Force
2013
Cryptanalysis of Public-Key Cryptosystems That Use Subcodes of Algebraic Geometry Codes
Irene Márquez, Alain Couvreur, R. Pellikaan
CIM Series in Mathematical Sciences, 2015
A message recovery attack on multivariate polynomial trapdoor function
PeerJ Computer Science
Algebraic Attacks and Decomposition of Boolean Functions
Lecture Notes in Computer Science, 2004
CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited
IACR Cryptol. ePrint Arch., 2018
2005
Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic Eraser
arXiv (Cornell University), 2016