Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Stanislav Bulygin"'
Autor:
Stanislav Bulygin
Publikováno v:
Codes, Cryptology and Curves with Computer Algebra
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::89130d9eaa7c66222a39cfd875a8eff1
https://doi.org/10.1017/9780511982170.013
https://doi.org/10.1017/9780511982170.013
Autor:
Stanislav Bulygin
Publikováno v:
Codes, Cryptology and Curves with Computer Algebra
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fb0151ba891a30def13c532ddc72df98
https://doi.org/10.1017/9780511982170.011
https://doi.org/10.1017/9780511982170.011
Publikováno v:
Applicable Algebra in Engineering, Communication and Computing. 24:255-275
In Sakumoto et al. (CRYPTO 2011, LNCS, vol 6841. Springer, Berlin, pp 706–723, 2011), presented a new multivariate identification scheme, whose security is based solely on the MQ-Problem of solving systems of quadratic equations over finite fields.
Publikováno v:
Designs, Codes and Cryptography. 73:997-1022
In this paper we investigate the invariant property of PRINTcipher initially discovered by Leander et al. in their CRYPTO 2011 paper. We provide a complete study of the attack and show that there exist 64 families of weak keys for PRINTcipher---48 an
Autor:
Mohamed Saied Emam Mohamed, Michael Zohner, Michael Walter, Johannes Buchmann, Annelie Heuser, Stanislav Bulygin
Publikováno v:
HOST
In this paper, we present improvements of the algebraic side-channel analysis of the Advanced Encryption Standard (AES) proposed in the works of M. Renauld and F.-X. Standaert. In particular, we optimize the algebraic representation of both the AES b
Publikováno v:
International Journal of Information Security. 11:137-147
In 1994, Shor showed that quantum computers will be able to break cryptosystems based on the problems of integer factorization and the discrete logarithm, for example, RSA or ECC. Code-based cryptosystems are promising alternatives to public-key sche
Publikováno v:
Mathematics in Computer Science. 3:185-200
This work is devoted to attacking the small scale variants of the Advanced Encryption Standard (AES) via systems that contain only the initial key variables. To this end, we investigate a system of equations that naturally arises in the AES, and then
Autor:
Ruud Pellikaan, Stanislav Bulygin
Publikováno v:
Journal of Symbolic Computation, 44(12), 1626-1643. Academic Press Inc.
The problem of bounded distance decoding of arbitrary linear codes using Gröbner bases is addressed. A new method is proposed, which is based on reducing an initial decoding problem to solving a certain system of polynomial equations over a finite f
Publikováno v:
Information Security and Cryptology ISBN: 9783642385186
Inscrypt
Inscrypt
In this paper we demonstrate how to use Mixed Integer Linear Programming to optimize guessing strategies for algebraic cryptanalysis with applications to the block cipher EPCBC. Using our optimized guessing strategy we are able to attack 5 rounds of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::77da91e834828289bcddc947de6ebd6b
https://doi.org/10.1007/978-3-642-38519-3_12
https://doi.org/10.1007/978-3-642-38519-3_12