Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
38
views
17
references
Top references
cited by
14
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,427
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Fast Software Encryption
Improving Fast Algebraic Attacks
other
Author(s):
Frederik Armknecht
Publication date
(Print):
2004
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Numerical Algebra, Matrix Theory, Differential-Algebraic Equations, and Control Theory
Most cited references
17
Record
: found
Abstract
: not found
Article
: not found
Gaussian elimination is not optimal
Volker Strassen
(1969)
0
comments
Cited
273
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book
: not found
Introduction to Finite Fields and their Applications
Rudolf Lidl
,
Harald Niederreiter
(2012)
0
comments
Cited
60
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Algebraic Attacks on Stream Ciphers with Linear Feedback
Nicolas T. Courtois
,
Willi Meier
(2003)
0
comments
Cited
45
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2004
Pages
: 65-82
DOI:
10.1007/978-3-540-25937-4_5
SO-VID:
ca230884-b4b4-4c78-b4b4-60d9fb343735
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
New Cryptographic Primitives Based on Multiword T-Functions
pp. 226
A New Stream Cipher HC-256
pp. 245
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher
pp. 260
Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices
pp. 49
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering
pp. 65
Improving Fast Algebraic Attacks
pp. 279
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware
pp. 299
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST
pp. 332
Two Power Analysis Attacks against One-Mask Methods
pp. 348
Nonce-Based Symmetric Encryption
pp. 359
Ciphers Secure against Related-Key Attacks
pp. 389
The EAX Mode of Operation
pp. 408
CWC: A High-Performance Conventional Authenticated Encryption Mode
Similar content
3,427
Increase of malaria attacks among children presenting concomitant infection by Schistosoma mansoni in Senegal
Authors:
Cheikh Sokhna
,
Jean-Yves Le Hesran
,
Pape A Mbaye
…
Efficacy of a fixed combination of indomethacin, prochlorperazine, and caffeine versus sumatriptan in acute treatment of multiple migraine attacks: a multicenter, randomized, crossover trial.
Authors:
M Fonzari
,
L Vecchiet
,
P. Bianco
…
Survey and Classification of Automotive Security Attacks
Authors:
Florian Sommer
,
Jürgen Dürrwang
,
Reiner Kriesten
See all similar
Cited by
14
Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity
Authors:
Sumanta Sarkar
,
Subhamoy Maitra
,
Deepak Kumar Dalai
Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity
Authors:
Deepak Kumar Dalai
,
Kishan Chand Gupta
,
Subhamoy Maitra
An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity
Authors:
Claude Carlet
,
Keqin Feng
See all cited by