Author:
Sušil Petr,Sepehrdad Pouyan,Vaudenay Serge,Courtois Nicolas
Funder
Swiss National Foundation
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference46 articles.
1. Albrecht, M.R., Cid, C., Faugère, J.-C., Perret, L.: On the relation between the mutant strategy and the normal selection strategy in Gröbner basis algorithms. IACR Cryptol. ePrint Arch. 2011, 164 (2011)
2. Albrecht, M.R., Cid, C., Faugère, J.-C., Perret, L.: On the relation between the MXL family of algorithms and Gröbner basis algorithms. J. Symb. Comput. 47(8), 926–941 (2012)
3. Al-Hinai, S., Dawson, E., Henricksen, M., Simpson, L.-R.: On the security of the LILI family of stream ciphers against algebraic attacks. In: Josef, P., Hossein, G., Dawson, E. (eds.) ACISP 07, vol. 4586 of LNCS, pp. 11–28, Townsville, Australia, July 2–4. Springer, Berlin (2007)
4. Ars, G., Faugère, J.-C., Imai, H., Kawazoe, M., Sugita, M.: Comparison between XL and Gröbner basis algorithms. In: Pil Joong, L. (ed.) ASIACRYPT 2004, vol. 3329 of LNCS, pp. 338–353, Jeju Island, Korea, December 5–9. Springer, Berlin (2004)
5. Aumasson, J.-P., Dinur, I., Meier, W., Shamir, A.: Cube testers and key recovery attacks on reduced-round MD6 and Trivium. In: Orr, D. (ed.) FSE 2009, vol. 5665 of LNCS, pp. 1–22, Leuven, Belgium, February 22–25. Springer, Berlin (2009)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献