RUS  ENG
Полная версия
ЖУРНАЛЫ // Дискретная математика

Дискрет. матем., 2006, том 18, выпуск 3, страницы 138–151 (Mi dm66)

О некоторых алгоритмах построения аннигиляторов низкой степени для булевых функций
В. В. Баев

Список литературы

1. Courtois N., Meier W., “Algebraic attacks on stream ciphers with linear feedback”, Lecture Notes Computer Sci., 2656, 2003, 345–359  mathscinet  zmath
2. Meier W., Pasalic E., Carlet C., “Algebraic attacks and decomposition of Boolean functions”, Lecture Notes Computer Sci., 3027, 2004, 474–491  mathscinet  zmath
3. Armknecht F., On the existence of low-degree equations for algebraic attacks, http://eprint.iacr.org/2004/185
4. Мак-Вильямс Ф., Слоэн Н., Теория кодов, исправляющих ошибки, Связь, Москва, 1979
5. Кнут Д., Искусство программирования для ЭВМ, {rm т. 3.:} Сортировка и поиск, Мир, Москва, 1978
6. Armknecht F., “Improving fast algebraic attacks”, Lecture Notes Computer Sci., 3017, 2004, 65–82  zmath
7. Courtois N., “Fast algebraic attacks on stream ciphers with linear feedback”, Lecture Notes Computer Sci., 2729, 2003, 177–194  mathscinet
8. Courtois N., “Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt”, Lecture Notes Computer Sci., 2587, 2002, 182–199  mathscinet
9. Courtois N., Klimov A., Patarin J., Shamir A., “Efficient algorithms for solving overdefined systems of multivariate polynomial equations”, Lecture Notes Computer Sci., 1807, 2000, 392–407  mathscinet  zmath
10. Hawkes P., Rose G., “Rewriting variables: the complexity of fast algebraic attacks on stream ciphers”, Lecture Notes Computer Sci., 3152, 2004, 390–406  mathscinet  zmath
11. Menezes A., van Oorschot P., Vanstone S., Handbook of applied cryptography, CRC Press, Boca Raton, FL, 1996
12. Mihaljevic M., Imai H., “Cryptanalysis of Toyocrypt-HS1 stream cipher”, IEICE Trans. Fund., E85-A (2002), 66–73
13. Saarinen M.-J., “A time-memory tradeoff attack against LILI-128”, Lecture Notes Computer Sci., 2365, 2002, 231–236  zmath
14. Simpson L., Dawson E., Golic J., Millan W., “LILI keystream generator”, Lecture Notes Computer Sci., 2012, 2000, 248–261  mathscinet


© МИАН, 2025