Voir la notice de l'article provenant de la source Math-Net.Ru
@article{DM_2006_18_3_a10, author = {V. V. Baev}, title = {On some algorithms for constructing low-degree annihilators for {Boolean} functions}, journal = {Diskretnaya Matematika}, pages = {138--151}, publisher = {mathdoc}, volume = {18}, number = {3}, year = {2006}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/DM_2006_18_3_a10/} }
V. V. Baev. On some algorithms for constructing low-degree annihilators for Boolean functions. Diskretnaya Matematika, Tome 18 (2006) no. 3, pp. 138-151. http://geodesic.mathdoc.fr/item/DM_2006_18_3_a10/
[1] Courtois N., Meier W., “Algebraic attacks on stream ciphers with linear feedback”, Lecture Notes Computer Sci., 2656, 2003, 345–359 | MR | Zbl
[2] Meier W., Pasalic E., Carlet C., “Algebraic attacks and decomposition of Boolean functions”, Lecture Notes Computer Sci., 3027, 2004, 474–491 | MR | Zbl
[3] Armknecht F., On the existence of low-degree equations for algebraic attacks, http://eprint.iacr.org/2004/185
[4] Mak-Vilyams F., Sloen N., Teoriya kodov, ispravlyayuschikh oshibki, Svyaz, Moskva, 1979
[5] Knut D., Iskusstvo programmirovaniya dlya EVM, {rm t. 3.:} Sortirovka i poisk, Mir, Moskva, 1978
[6] Armknecht F., “Improving fast algebraic attacks”, Lecture Notes Computer Sci., 3017, 2004, 65–82 | Zbl
[7] Courtois N., “Fast algebraic attacks on stream ciphers with linear feedback”, Lecture Notes Computer Sci., 2729, 2003, 177–194 | MR
[8] Courtois N., “Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt”, Lecture Notes Computer Sci., 2587, 2002, 182–199 | MR
[9] Courtois N., Klimov A., Patarin J., Shamir A., “Efficient algorithms for solving overdefined systems of multivariate polynomial equations”, Lecture Notes Computer Sci., 1807, 2000, 392–407 | MR | Zbl
[10] Hawkes P., Rose G., “Rewriting variables: the complexity of fast algebraic attacks on stream ciphers”, Lecture Notes Computer Sci., 3152, 2004, 390–406 | MR | Zbl
[11] Menezes A., van Oorschot P., Vanstone S., Handbook of applied cryptography, CRC Press, Boca Raton, FL, 1996
[12] Mihaljevic M., Imai H., “Cryptanalysis of Toyocrypt-HS1 stream cipher”, IEICE Trans. Fund., E85-A (2002), 66–73
[13] Saarinen M.-J., “A time-memory tradeoff attack against LILI-128”, Lecture Notes Computer Sci., 2365, 2002, 231–236 | Zbl
[14] Simpson L., Dawson E., Golic J., Millan W., “LILI keystream generator”, Lecture Notes Computer Sci., 2012, 2000, 248–261 | MR