General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
- 1 January 2005
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 33 references indexed in Scilit:
- Improving Fast Algebraic AttacksLecture Notes in Computer Science, 2004
- Algebraic Attacks on SOBER-t32 and SOBER-t16 without StutteringLecture Notes in Computer Science, 2004
- Algebraic Attacks on Summation GeneratorsLecture Notes in Computer Science, 2004
- On the Use of GF-Inversion as a Cryptographic PrimitiveLecture Notes in Computer Science, 2004
- Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream CiphersLecture Notes in Computer Science, 2004
- Feistel Schemes and Bi-linear CryptanalysisLecture Notes in Computer Science, 2004
- Algebraic Attacks and Decomposition of Boolean FunctionsLecture Notes in Computer Science, 2004
- Algebraic Attacks on Combiners with MemoryLecture Notes in Computer Science, 2003
- A new efficient algorithm for computing Gröbner bases (F4)Journal of Pure and Applied Algebra, 1999
- Matrix multiplication via arithmetic progressionsJournal of Symbolic Computation, 1990