Author:
Zhang Jie,Song ShouChao,Du Jiao,Wen QiaoYan
Publisher
Springer Science and Business Media LLC
Reference26 articles.
1. Courtois N, Meier W. Algebraic attacks on stream ciphers with linear feedback. In: Proceedings of Advances in Cryptology-EUROCRYPT, Berlin, 2003. Lecture Notes in Computer Science, 2656. 345–359
2. Courtois N. Fast algebraic attacks on stream ciphers with linear feedback. In: Proceedings of Advances in Cryptology-CRYPTO, Berlin, 2003. Lecture Notes in Computer Science, 2729: 176–194
3. Armknecht F, Krause M. Algebraic attacks on combiners with memory. In: Proceedings of Advances in Cryptology-CRYPTO, Berlin, 2003. Lecture Notes in Computer Science, 2729: 162–175
4. Meier W, Pasalic E, Carlet C. Algebraic attacks and decomposition of Boolean functions. In: Proceedings of Advances in Cryptology-EUROCRYPT, Berlin, 2004. Lecture Notes in Computer Science, 3027: 474–491
5. Dalai D K, Maitra S, Sarkar S. Basic theory in construction Boolean functions with maximum possible annihilator immunity, Designs, Codes and Cryptography. Springer Neth, 2006, 40: 41–58
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献