Information Technology Reference
In-Depth Information
9. Courtois, N.: Fast algebraic attacks on stream ciphers with linear feedback. In:
Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 176-194. Springer, Heidelberg
(2003)
10. Dalai, D.K., Gupta, K.C., Maitra, S.: Cryptographically Significant Boolean func-
tions: Construction and Analysis in terms of Algebraic Immunity. In: Gilbert, H.,
Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 98-111. Springer, Heidelberg
(2005)
11. eSTREAM - The ECRYPT Stream Cipher Project,
http://www.ecrypt.eu.org/stream/
12. Gollmann, D.: Pseudo random properties of cascade connections of clock controlled
shift registers. In: Advances in Cryptology-Eurocrypt 1984. LNCS, pp. 93-98.
Springer, Heidelberg (1984)
13. Golomb, S.W.: Shift Register Sequences. Holden-Day, Inc., San Francisco 1967,
revised edition. Aegean Park Press, Laguna Hills, CA (1982)
14. Golomb, S.W., Gong, G.: Signal Design with Good Correlation: for Wireless Com-
munications, Cryptography and Radar Applications. Cambridge University Press,
Cambridge (2005)
15. Gong, G.: On existence and Invariant of algebraic attacks, Technical Report of
University of Waterloo, CORR 2004-17 (2004)
16. Hawkes, P., Rose, G.G.: Rewriting variables: the complexity of fast algebraic at-
tacks on stream ciphers. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152,
pp. 390-406. Springer, Heidelberg (2004)
17. Meier, W., Pasalic, E., Carlet, C.: Algebraic attacks and decomposition of boolean
functions. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS,
vol. 3027, pp. 474-491. Springer, Heidelberg (2004)
18. Nawaz, Y., Gong, G., Gupta, K.C.: Upper bounds on algebraic immunity of boolean
power functions. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 375-389.
Springer, Heidelberg (2006)
19. Nawaz, Y., Gupta, K.C., Gong, G.: Ecient techniques to find algebraic immunity
of s-boxes based on power mappings. In: Proceedings of International Workshop
on Coding and Cryptography, Versailles, France, April 16-20, 2007, pp. 237-246
(2007)
20. Rønjom, S., Helleseth, T.: A New Attack on the Filter Generator. IEEE Transac-
tions on Information Theory 53(5), 1752-1758 (2007)
21. Rønjom, S., Gong, G., Helleseth, T.: On attacks on filtering generators using linear
subspace structures. In: Golomb, S.W., Gong, G., Helleseth, T., Song, H.-Y. (eds.)
SSC 2007. LNCS, vol. 4893, pp. 204-217. Springer, Heidelberg (2007)
22. Rønjom, S., Gong, G., Helleseth, T.: A survey of recent attacks on the filter gen-
erator. In: The Proceedings of AAECC 2007, pp. 7-17 (2007)
23. Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer, Heidelberg (1986)
24. Shamir, A., Patarin, J., Courtois, N., Klimov, A.: Ecient algorithms for solving
overdefined systems of multivariate polynomial equations. In: Preneel, B. (ed.)
EUROCRYPT 2000. LNCS, vol. 1807, pp. 392-407. Springer, Heidelberg (2000)
25. Youssef, A.M., Gong, G.: Hyper-Bent Functions. In: Pfitzmann, B. (ed.) EURO-
CRYPT 2001. LNCS, vol. 2045, pp. 406-419. Springer, Heidelberg (2001)
 
Search WWH ::




Custom Search