|
|
|
|
ЛИТЕРАТУРА
|
|
| |
| 1. |
Fischer S., Khazaei S., Meier W., “Chosen IV statistical analysis for key recovery attacks on stream ciphers”, LNCS, 5023, 2008, 236–245 |
| 2. |
Dinur I., Shamir A., “Cube attacks on tweakable black box polynomials”, LNCS, 5479, 2009, 278–299 |
| 3. |
De Canniere C., “Trivium: a stream cipher construction inspired by block cipher design principles”, LNCS, 4176, 2006, 171–186 |
| 4. |
Bard G., Algebraic Cryptanalysis, Springer, 2009 |
| 5. |
Semenov A., Zaikin O., Otpuschennikov I., et al., “On cryptographic attacks using backdoors for SAT”, Proc. AAAI (Palo Alto, USA), 2018, 6641–6648 |
| 6. |
Otpuschennikov I., Semenov A., Gribanova I., et al., “Encoding cryptographic functions to SAT using Transalg system”, Proc. ECAI (Hague, Netherlands), 2016, 1594–1595 |
| 7. |
Semenov A., Otpuschennikov I., Gribanova I., et al., “Translation of algorithmic descriptions of discrete functions to SAT with applications to cryptanalysis problems”, Logical Methods Computer Sci., 16:1 (2020), 29:1–29:42 |
| 8. |
Цейтин Г. С., “О сложности вывода в исчислении высказываний”, Записки научных семинаров ЛОМИ, 8, 1968, 234–259 |
| 9. |
Яблонский С. В., Введение в дискретную математику, Наука, М., 1986 |
| 10. |
Чень Ч., Ли Р., Математическая логика и автоматическое доказательство теорем, Наука, М., 1983 |
| 11. |
Williams R., Gomes C., Selman B., “Backdoors to typical case complexity”, Proc. IJCAI'03 (Acapulco, Mexico), 2003, 1173–1178 |
| 12. |
Bryton R., Mishchenko A., “ABC: An academic industrial-strength verification tool”, LNCS, 6174, 2010, 24–40 |
| 13. |
Kuehlmann A. Paruthi V., Krohm F., Ganai M., “Robust Boolean reasoning for equivalence checking and functional property verification”, IEEE Trans. Computer-Aided Des. Integr. Circuits Systems, 21:12 (2002), 1377–1394 |
| 14. |
Hell M., Johansson T., Meier W., “Grain: a stream cipher for constrained environments”, Intern. J. Wireless Mobile Computing, 2:1 (2007), 86–93 |
| 15. |
Beaulieu R., Shors D., Smith J., et al., “The Simon and Speck lightweight block ciphers”, 52nd Ann. Design Automation Conf. (San Francisco, USA), 2015, 175:1–175:6 |
| 16. |
Semenov A., Antonov K., Otpuschennikov I., Pavlenko A., “Using linearizing sets to solve multivariate quadratic equations in algebraic cryptanalysis”, IEEE Access, 11 (2023), 120319–120333 |
| 17. |
Biere A., Fazekas K., Fleury M., and Heisinger M., “CaDiCaL, Kissat, Paracooba, Plingeling and Treengeling entering the SAT Competition 2020”, Proc. SAT Competition (Helsinki), 2020, 50–53 |
| 18. |
Иркутский суперкомпьютерный центр, https://hpc.icc.ru/hardware/index.html |