Voir la notice de l'article provenant de la source Math-Net.Ru
@article{DM_2007_19_4_a8, author = {V. V. Baev}, title = {An enhanced algorithm to search for low-degree annihilators for {a~Zhegalkin} polynomial}, journal = {Diskretnaya Matematika}, pages = {132--138}, publisher = {mathdoc}, volume = {19}, number = {4}, year = {2007}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/DM_2007_19_4_a8/} }
V. V. Baev. An enhanced algorithm to search for low-degree annihilators for a~Zhegalkin polynomial. Diskretnaya Matematika, Tome 19 (2007) no. 4, pp. 132-138. http://geodesic.mathdoc.fr/item/DM_2007_19_4_a8/
[1] Alferov A. P., Zubov A. Yu., Kuzmin A. S., Cheremushkin A. V., Osnovy kriptografii, Gelios, Moskva, 2001
[2] Baev V. V., “O slozhnosti poiska annigilyatorov nizkoi stepeni dlya bulevykh funktsii”, Materialy Mezhdunarodnoi nauchnoi konferentsii po problemam bezopasnosti i protivodeistviyu terrorizmu, MTsNMO, Moskva, 2006, 198–204
[3] Baev V. V., “Nekotorye nizhnie otsenki na algebraicheskuyu immunnost funktsii, zadannykh svoimi treis-formami”, Trudy VII Mezhdunarodnoi konferentsii “Diskretnye modeli v teorii upravlyayuschikh sistem”, MAKS, Moskva, 2006, 25–29
[4] Baev V. V., “O nekotorykh algoritmakh postroeniya annigilyatorov nizkoi stepeni dlya bulevykh funktsii”, Diskretnaya matematika, 18:3 (2006), 138–151 | MR | Zbl
[5] Courtois N., Meier W., “Algebraic attacks on stream ciphers with linear feedback”, Lecture Notes Computer Sci., 2656 (2003), 345–359 | DOI | MR | Zbl
[6] Didier F., Tillich J. P., “Computing the algebraic immunity efficiently”, Lecture Notes Computer Sci., 4047 (2006), 359–374 | DOI
[7] Meier W., Pasalic E., Carlet C., “Algebraic attacks and decomposition of Boolean functions”, Lecture Notes Computer Sci., 3027 (2004), 474–491 | MR | Zbl