Matrix multiplication via arithmetic progressions
Journal of Symbolic Computation - Special issue on computational algebraic complexity
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A new efficient algorithm for computing Gröbner bases without reduction to zero (F5)
Proceedings of the 2002 international symposium on Symbolic and algebraic computation
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Algebraic attacks on stream ciphers with linear feedback
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Results on algebraic immunity for cryptographically significant boolean functions
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Algebraic attacks on combiners with memory and several outputs
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Information sets and partial permutation decoding for codes from finite geometries
Finite Fields and Their Applications
Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity
Designs, Codes and Cryptography
On analysis and synthesis of (n, k)-non-linear feedback shift registers
Proceedings of the conference on Design, automation and test in Europe
Attacking the Filter Generator over GF(2m)
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Information Security and Cryptology --- ICISC 2008
Further properties of several classes of Boolean functions with optimum algebraic immunity
Designs, Codes and Cryptography
A New Construction of Boolean Functions with Maximum Algebraic Immunity
ISC '09 Proceedings of the 12th International Conference on Information Security
Extensions of the Cube Attack Based on Low Degree Annihilators
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity
Information Security Applications
Probabilistic versus deterministic algebraic cryptanalysis: a performance comparison
IEEE Transactions on Information Theory
A transformation from the Fibonacci to the Galois NLFSRs
IEEE Transactions on Information Theory
VLSI implementation of a non-linear feedback shift register for high-speed cryptography applications
Proceedings of the 20th symposium on Great lakes symposium on VLSI
The linear vector space spanned by the nonlinear filter generator
SSC'07 Proceedings of the 2007 international conference on Sequences, subsequences, and consequences
On extended algebraic immunity
Designs, Codes and Cryptography
Designs, Codes and Cryptography
IEEE Transactions on Information Theory
Discrete Applied Mathematics
How to speed-up your NLFSR-based stream cipher
Proceedings of the Conference on Design, Automation and Test in Europe
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Cryptography and Communications
Reducing the number of homogeneous linear equations in finding annihilators
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
On the higher order nonlinearities of algebraic immune functions
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Attack based on direct sum decomposition against the nonlinear filter generator
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
On the resistance of boolean functions against fast algebraic attacks
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Algebraic immunity of S-boxes and augmented functions
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Secondary constructions of Boolean functions with maximum algebraic immunity
Cryptography and Communications
Algebraic attacks on a class of stream ciphers with unknown output function
Designs, Codes and Cryptography
Designs, Codes and Cryptography
Hi-index | 0.18 |
The recently developed algebraic attacks apply to all keystream generators whose internal state is updated by a linear transition function, including LFSR-based generators. Here, we describe this type of attacks and we present some open problems related to their complexity. We also investigate the design criteria which may guarantee a high resistance to algebraic attacks for keystream generators based on a linear transition function.