Methods of solution of systems of quasisymmetric equations with applications to the analysis of clock-controlled generators
Matematičeskie voprosy kriptografii, Tome 1 (2010) no. 3, pp. 67-91 Cet article a éte moissonné depuis la source Math-Net.Ru

Voir la notice de l'article

Quasisymmetric functions and systems of quasisymmetric equations are defined. An algorithm of solution of such systems is based on the reduction to a shortest path problem. A possibility of solution of system with noise is discussed. Application of results to the analysis of clock-controlled generators expands the domain of algebraic methods and increase the effectiveness of corresponding attacks.
@article{MVK_2010_1_3_a4,
     author = {V. G. Smirnov},
     title = {Methods of solution of systems of quasisymmetric equations with applications to the analysis of clock-controlled generators},
     journal = {Matemati\v{c}eskie voprosy kriptografii},
     pages = {67--91},
     year = {2010},
     volume = {1},
     number = {3},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/MVK_2010_1_3_a4/}
}
TY  - JOUR
AU  - V. G. Smirnov
TI  - Methods of solution of systems of quasisymmetric equations with applications to the analysis of clock-controlled generators
JO  - Matematičeskie voprosy kriptografii
PY  - 2010
SP  - 67
EP  - 91
VL  - 1
IS  - 3
UR  - http://geodesic.mathdoc.fr/item/MVK_2010_1_3_a4/
LA  - ru
ID  - MVK_2010_1_3_a4
ER  - 
%0 Journal Article
%A V. G. Smirnov
%T Methods of solution of systems of quasisymmetric equations with applications to the analysis of clock-controlled generators
%J Matematičeskie voprosy kriptografii
%D 2010
%P 67-91
%V 1
%N 3
%U http://geodesic.mathdoc.fr/item/MVK_2010_1_3_a4/
%G ru
%F MVK_2010_1_3_a4
V. G. Smirnov. Methods of solution of systems of quasisymmetric equations with applications to the analysis of clock-controlled generators. Matematičeskie voprosy kriptografii, Tome 1 (2010) no. 3, pp. 67-91. http://geodesic.mathdoc.fr/item/MVK_2010_1_3_a4/

[1] Smirnov V. G., “Metody resheniya sistem diskretnykh uravnenii, osnovannye na postroenii grafa reshenii”, Trudy po diskretnoi matematike, 9, Gelios-ARV, M., 2006, 308–339

[2] Smirnov V. G., “Effektivnye algoritmy postroeniya grafa obschego resheniya dlya sistemy bulevykh uravnenii”, Trudy po diskretnoi matematike, 5, FIZMATLIT, M., 2002, 227–234

[3] Smirnov V. G., “Metody postroeniya grafov reshenii dlya sistem $k$-znachnykh uravnenii”, Trudy po diskretnoi matematike, 8, FIZMATLIT, M., 2004, 253–280

[4] Kormen T., Leizerson Ch., Rivest R., Algoritmy: postroenie i analiz, MTsNMO, M., 2001

[5] Balakin G. V., “Vvedenie v teoriyu sluchainykh sistem uravnenii”, Trudy po diskretnoi matematike, 1, TVP, M., 1997, 1–18 | MR | Zbl

[6] Birkgof G., Teoriya struktur, IL, M., 1951

[7] Sachkov V. N., Vvedenie v kombinatornye metody diskretnoi matematiki, Nauka, M., 1982 | MR | Zbl

[8] Potochnye shifry. Rezultaty zarubezhnoi otkrytoi kriptologii, M., 1997

[9] Shnaier B., Prikladnaya kriptografiya. Protokoly, algoritmy, iskhodnye teksty na yazyke Si, Triumf, M., 2002

[10] Al-Hinai S., Batten L., Colbert B., “Algebraic attacks on clock-controlled stream ciphers”, Lect. Notes Comput. Sci., 4058, 2006, 1–16 | Zbl