Sciweavers

CISC
2009
Springer
185views Cryptology» more  CISC 2009»
13 years 2 months ago
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages
In [10], Buchmann, Pyshkin and Weinmann have described two families of Feistel and SPN block ciphers called Flurry and Curry respectively. These two families of ciphers are fully p...
Jean-Charles Faugère, Ludovic Perret
SETA
2010
Springer
137views Mathematics» more  SETA 2010»
13 years 2 months ago
On a Conjecture about Binary Strings Distribution
It is a difficult challenge to find Boolean functions used in stream ciphers achieving all of the necessary criteria and the research of such functions has taken a significant d...
Jean-Pierre Flori, Hugues Randriam, Gérard ...
ICISC
2004
120views Cryptology» more  ICISC 2004»
13 years 6 months ago
Algebraic Attacks on Combiners with Memory and Several Outputs
Algebraic attacks on stream ciphers [14] recover the key by solving an overdefined system of multivariate equations. Such attacks can break several interesting cases of LFSR-based ...
Nicolas Courtois
DAGSTUHL
2007
13 years 6 months ago
How Fast can be Algebraic Attacks on Block Ciphers?
In this paper we give a specification of a new block cipher that can be called the Courtois Toy Cipher (CTC). It is quite simple, and yet very much like any other known block ciph...
Nicolas Courtois
EUROCRYPT
2006
Springer
13 years 8 months ago
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks
In this paper we propose several efficient algorithms for assessing the resistance of Boolean functions against algebraic and fast algebraic attacks when implemented in LFSRbased s...
Frederik Armknecht, Claude Carlet, Philippe Gabori...
CRYPTO
2003
Springer
156views Cryptology» more  CRYPTO 2003»
13 years 9 months ago
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs. Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relat...
Nicolas Courtois
WCC
2005
Springer
135views Cryptology» more  WCC 2005»
13 years 10 months ago
Open Problems Related to Algebraic Attacks on Stream Ciphers
Abstract. The recently developed algebraic attacks apply to all keystream generators whose internal state is updated by a linear transition function, including LFSR-based generator...
Anne Canteaut
INDOCRYPT
2005
Springer
13 years 10 months ago
Two Algebraic Attacks Against the F-FCSRs Using the IV Mode
This article presents some new results concerning two algebraic attacks against the F-FCSR constructions proposed in [2]. We focus on the parameters of the stream ciphers proposed ...
Thierry P. Berger, Marine Minier
ACISP
2006
Springer
13 years 10 months ago
On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions
In this paper we are interested in algebraic immunity of several well known highly-nonlinear vectorial Boolean functions (or Sboxes), designed for block and stream ciphers. Unfortu...
Nicolas Courtois, Blandine Debraize, Eric Garrido
CTRSA
2009
Springer
155views Cryptology» more  CTRSA 2009»
13 years 11 months ago
Cryptanalysis of CTC2
CTC is a toy cipher designed in order to assess the strength of algebraic attacks. While the structure of CTC is deliberately weak with respect to algebraic attacks, it was claimed...
Orr Dunkelman, Nathan Keller