|
|
|
Список литературы
|
|
|
1. |
Courtois N., Meier W., “Algebraic attacks on stream ciphers with linear feedback”, Lecture Notes Computer Sci., 2656, 2003, 345–359 |
2. |
Meier W., Pasalic E., Carlet C., “Algebraic attacks and decomposition of Boolean functions”, Lecture Notes Computer Sci., 3027, 2004, 474–491 |
3. |
Armknecht F., On the existence of low-degree equations for algebraic attacks, http://eprint.iacr.org/2004/185 |
4. |
Мак-Вильямс Ф., Слоэн Н., Теория кодов, исправляющих ошибки, Связь, Москва, 1979 |
5. |
Кнут Д., Искусство программирования для ЭВМ, {rm т. 3.:} Сортировка и поиск, Мир, Москва, 1978 |
6. |
Armknecht F., “Improving fast algebraic attacks”, Lecture Notes Computer Sci., 3017, 2004, 65–82 |
7. |
Courtois N., “Fast algebraic attacks on stream ciphers with linear feedback”, Lecture Notes Computer Sci., 2729, 2003, 177–194 |
8. |
Courtois N., “Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt”, Lecture Notes Computer Sci., 2587, 2002, 182–199 |
9. |
Courtois N., Klimov A., Patarin J., Shamir A., “Efficient algorithms for solving overdefined systems of multivariate polynomial equations”, Lecture Notes Computer Sci., 1807, 2000, 392–407 |
10. |
Hawkes P., Rose G., “Rewriting variables: the complexity of fast algebraic attacks on stream ciphers”, Lecture Notes Computer Sci., 3152, 2004, 390–406 |
11. |
Menezes A., van Oorschot P., Vanstone S., Handbook of applied cryptography, CRC Press, Boca Raton, FL, 1996 |
12. |
Mihaljevic M., Imai H., “Cryptanalysis of Toyocrypt-HS1 stream cipher”, IEICE Trans. Fund., E85-A (2002), 66–73 |
13. |
Saarinen M.-J., “A time-memory tradeoff attack against LILI-128”, Lecture Notes Computer Sci., 2365, 2002, 231–236 |
14. |
Simpson L., Dawson E., Golic J., Millan W., “LILI keystream generator”, Lecture Notes Computer Sci., 2012, 2000, 248–261 |