Analysis and design of stream ciphers
Analysis and design of stream ciphers
Fast correlation attacks on certain stream ciphers
Journal of Cryptology
Matrix multiplication via arithmetic progressions
Journal of Symbolic Computation - Special issue on computational algebraic complexity
Nonlinearity criteria for cryptographic functions
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Handbook of Applied Cryptography
Handbook of Applied Cryptography
The Security of Hidden Field Equations (HFE)
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
On Correlation-Immune Functions
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
On the Security of Nonlinear Filter Generators
Proceedings of the Third International Workshop on Fast Software Encryption
A Time-Memory Tradeoff Attack Against LILI-128
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
A Fast New DES Implementation in Software
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Fast low order approximation of cryptographic functions
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
About the XL algorithm over GF(2)
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
An algebraic attack on the improved summation generator with 2-bit memory
Information Processing Letters
Concatenating Indicators of Flats for Designing Cryptographic Functions
Designs, Codes and Cryptography
Design and Properties of a New Pseudorandom Generator Based on a Filtered FCSR Automaton
IEEE Transactions on Computers
Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity
Designs, Codes and Cryptography
A survey of recent developments in cryptographic algorithms for smart cards
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cryptanalysis of Achterbahn-version 1 and -version 2
Journal of Computer Science and Technology
WG: A family of stream ciphers with designed randomness properties
Information Sciences: an International Journal
Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
International Journal of Security and Networks
Solving Multiple Right Hand Sides linear equations
Designs, Codes and Cryptography
New Stream Cipher Designs
Design of a New Stream Cipher--LEX
New Stream Cipher Designs
New Stream Cipher Designs
New Stream Cipher Designs
Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks
Information Security and Cryptology
Information Security and Cryptology
Algebraic and Slide Attacks on KeeLoq
Fast Software Encryption
Sequences, DFT and Resistance against Fast Algebraic Attacks
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
On the Number of Linearly Independent Equations Generated by XL
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
Parallel Generation of l-Sequences
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
On the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their Generalizations
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
An efficient cryptosystem Delta for stream cipher applications
Computers and Electrical Engineering
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Modified clock-controlled alternating step generators
Computer Communications
Information Security and Cryptology --- ICISC 2008
Cube Attacks on Tweakable Black Box Polynomials
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Further properties of several classes of Boolean functions with optimum algebraic immunity
Designs, Codes and Cryptography
Word Oriented Cascade Jump σ-LFSR
AAECC-18 '09 Proceedings of the 18th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Extending SAT Solvers to Cryptographic Problems
SAT '09 Proceedings of the 12th International Conference on Theory and Applications of Satisfiability Testing
Interactions between computer algebra (Gröbner bases) and cryptology
Proceedings of the 2009 international symposium on Symbolic and algebraic computation
Practical Algebraic Attacks on the Hitag2 Stream Cipher
ISC '09 Proceedings of the 12th International Conference on Information Security
A New Construction of Boolean Functions with Maximum Algebraic Immunity
ISC '09 Proceedings of the 12th International Conference on Information Security
Constructing symmetric boolean functions with maximum algebraic immunity
IEEE Transactions on Information Theory
On guess and determine cryptanalysis of LFSR-based stream ciphers
IEEE Transactions on Information Theory
Encryption System with Variable Number of Registers
Computers and Electrical Engineering
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Extensions of the Cube Attack Based on Low Degree Annihilators
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity
Information Security Applications
Quadratic Equations from a Kind of S-boxes
Information Security Applications
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
An algebraic attack on the improved summation generator with 2-bit memory
Information Processing Letters
Probabilistic versus deterministic algebraic cryptanalysis: a performance comparison
IEEE Transactions on Information Theory
The design of a stream cipher LEX
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Multi-pass fast correlation attack on stream ciphers
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
When stream cipher analysis meets public-key cryptography
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Efficient computation of algebraic immunity of symmetric boolean functions
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
On the security of the LILI family of stream ciphers against algebraic attacks
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
X-FCSR: a new software oriented stream cipher based upon FCSRs
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Attacking the filter generator by finding zero inputs of the filtering function
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
ICISS'07 Proceedings of the 3rd international conference on Information systems security
A survey of recent attacks on the filter generator
AAECC'07 Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes
AAECC'07 Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Efficient computation of the best quadratic approximations of cubic boolean functions
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Algebraic cryptanalysis of the data encryption standard
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Randomness and representation of span n sequences
SSC'07 Proceedings of the 2007 international conference on Sequences, subsequences, and consequences
A class of Boolean functions with four-valued Walsh spectra
APCC'09 Proceedings of the 15th Asia-Pacific conference on Communications
Constructions of cryptographically significant boolean functions using primitive polynomials
IEEE Transactions on Information Theory
On extended algebraic immunity
Designs, Codes and Cryptography
Designs, Codes and Cryptography
IEEE Transactions on Information Theory
An analysis of the RC4 family of stream ciphers against algebraic attacks
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
Discrete Applied Mathematics
Nonlinear equivalence of stream ciphers
FSE'10 Proceedings of the 17th international conference on Fast software encryption
Cryptography for network security: failures, successes and challenges
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Z4-Nonlinearity of a constructed quaternary cryptographic functions class
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
On a conjecture about binary strings distribution
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
Upper bound for algebraic immunity on a subclass of Maiorana McFarland class of bent functions
Information Processing Letters
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Algebraic cryptanalysis of curry and flurry using correlated messages
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Hill climbing algorithms and Trivium
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Designs, Codes and Cryptography
Loiss: a byte-oriented stream cipher
IWCC'11 Proceedings of the Third international conference on Coding and cryptology
Fast correlation attacks: methods and countermeasures
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Results on the immunity of Boolean functions against probabilistic algebraic attacks
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Algebraic techniques in differential cryptanalysis revisited
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
An efficient, parameterized and scalable S-box for stream ciphers
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Algebraic precomputations in differential and integral cryptanalysis
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
A note on fast algebraic attacks and higher order nonlinearities
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
On equivalence classes of boolean functions
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
A different algebraic analysis of the ZUC stream cipher
Proceedings of the 4th international conference on Security of information and networks
Algebraic analysis of the SSS stream cipher
Proceedings of the 4th international conference on Security of information and networks
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Grain-128a: a new version of Grain-128 with optional authentication
International Journal of Wireless and Mobile Computing
New guess-and-determine attack on the self-shrinking generator
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Construction and analysis of boolean functions of 2t+1 variables with maximum algebraic immunity
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Extending the resynchronization attack
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
A new simple technique to attack filter generators and related ciphers
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Algebraic attacks on clock-controlled cascade ciphers
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Using wiedemann's algorithm to compute the immunity against algebraic and fast algebraic attacks
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Improved pairing protocol for bluetooth
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Constructing single- and multi-output boolean functions with maximal algebraic immunity
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Linear cryptanalysis of the TSC family of stream ciphers
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Open problems related to algebraic attacks on stream ciphers
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
Introducing a new variant of fast algebraic attacks and minimizing their successive data complexity
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
On bent and highly nonlinear balanced/resilient functions and their algebraic immunities
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
A general formulation of algebraic and fast correlation attacks based on dedicated sample decimation
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
A new class of single cycle t-functions
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
F-FCSR: design of a new class of stream ciphers
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
The ANF of the composition of addition and multiplication mod 2n
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
A new distinguisher for clock controlled stream ciphers
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Analysis of the bit-search generator and sequence compression techniques
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Two attacks against the HBB stream cipher
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Boolean functions optimizing most of the cryptographic criteria
Discrete Applied Mathematics
On the algebraic immunity of symmetric boolean functions
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Design principles for combiners with memory
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Two algebraic attacks against the F-FCSRs using the IV mode
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Reducing the space complexity of BDD-Based attacks on keystream generators
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Computing the algebraic immunity efficiently
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Upper bounds on algebraic immunity of boolean power functions
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Cryptography and Communications
The decimated sample based improved algebraic attacks on the nonlinear filters
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Resistance of SNOW 2.0 against algebraic attacks
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Efficient representation and software implementation of resilient maiorana-mcfarland s-boxes
WISA'04 Proceedings of the 5th international conference on Information Security Applications
General principles of algebraic attacks and new design criteria for cipher components
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
The inverse s-box, non-linear polynomial relations and cryptanalysis of block ciphers
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Results on algebraic immunity for cryptographically significant boolean functions
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
On boolean functions with generalized cryptographic properties
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Algebraic attacks on combiners with memory and several outputs
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
On immunity profile of boolean functions
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
Reducing the number of homogeneous linear equations in finding annihilators
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
Partially perfect nonlinear functions and a construction of cryptographic boolean functions
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
On the higher order nonlinearities of algebraic immune functions
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
QUAD: a practical stream cipher with provable security
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
How to strengthen pseudo-random generators by using compression
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Efficient computation of algebraic immunity for algebraic and fast algebraic attacks
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Algebraic attacks on clock-controlled stream ciphers
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Evaluating the resistance of stream ciphers with linear feedback against fast algebraic attacks
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
On exact algebraic [non-]immunity of s-boxes based on power functions
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
On algebraic immunity and annihilators
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Probabilistic algebraic attacks
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Cryptanalysis of the F-FCSR stream cipher family
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
On the (im)possibility of practical and secure nonlinear filters and combiners
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Characterisations of extended resiliency and extended immunity of s-boxes
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
On the relation between the MXL family of algorithms and Gröbner basis algorithms
Journal of Symbolic Computation
The cryptographic power of random selection
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
An automatic, time-based, secure pairing protocol for passive RFID
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
On the triple-error-correcting cyclic codes with zero set {1, 2i + 1, 2i + 1}
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
Cube cryptanalysis of hitag2 stream cipher
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
Constructions of 1-resilient Boolean functions on odd number of variables with a high nonlinearity
Security and Communication Networks
Attack based on direct sum decomposition against the nonlinear filter generator
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
On the resistance of boolean functions against fast algebraic attacks
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Information Processing Letters
A note on the algebraic immunity of the Maiorana-McFarland class of bent functions
Information Processing Letters
Algebraic immunity of S-boxes and augmented functions
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Cryptanalysis of WG-7: a lightweight stream cipher
Cryptography and Communications
Correlation attacks on combination generators
Cryptography and Communications
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Perfect algebraic immune functions
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
On the algebraic attack against summation type keystream generators
International Journal of Information and Computer Security
CAR30: A new scalable stream cipher with rule 30
Cryptography and Communications
Designs, Codes and Cryptography
A new method to construct Boolean functions with good cryptographic properties
Information Processing Letters
Secondary constructions of Boolean functions with maximum algebraic immunity
Cryptography and Communications
Algebraic attacks on a class of stream ciphers with unknown output function
Designs, Codes and Cryptography
On the immunity of rotation symmetric Boolean functions against fast algebraic attacks
Discrete Applied Mathematics
Designs, Codes and Cryptography
Optimal parameters for the WG stream cipher family
Cryptography and Communications
Hi-index | 0.30 |
A classical construction of stream ciphers is to combine several LFSRs and a highly non-linear Boolean function f. Their security is usually analysed in terms of correlation attacks, that can be seen as solving a system of multivariate linear equations, true with some probability. At ICISC'02 this approach is extended to systems of higher-degree multivariate equations, and gives an attack in 292 for Toyocrypt, a Cryptrec submission. In this attack the key is found by solving an overdefined system of algebraic equations. In this paper we show how to substantially lower the degree of these equations by multiplying them by well-chosen multivariate polynomials. Thus we are able to break Toyocrypt in 249 CPU clocks, with only 20 Kbytes of keystream, the fastest attack proposed so far. We also successfully attack the Nessie submission LILI-128, within 257 CPU clocks (not the fastest attack known). In general, we show that if the Boolean function uses only a small subset (e.g. 10) of state/LFSR bits, the cipher can be broken, whatever is the Boolean function used (worst case). Our new general algebraic attack breaks stream ciphers satisfying all the previously known design criteria in at most the square root of the complexity of the previously known generic attack.