Algebraic Attacks Using Binary Decision Diagrams
From MaRDI portal
Publication:2947100
DOI10.1007/978-3-319-21356-9_4zbMath1401.94171OpenAlexW2294550017MaRDI QIDQ2947100
Håvard Raddum, Oleksandr Kazymyrov
Publication date: 21 September 2015
Published in: Cryptography and Information Security in the Balkans (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-21356-9_4
Related Items
Influence of addition modulo \(2^n\) on algebraic attacks ⋮ Boolean polynomials, BDDs and CRHS equations -- connecting the dots with CryptaPath ⋮ Factorization using binary decision diagrams
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Obtaining and solving systems of equations in key variables only for the small variants of AES
- Solving multiple right hand sides linear equations
- Solving Compressed Right Hand Side Equation Systems with Linear Absorption
- Verification of Restricted EA-Equivalence for Vectorial Boolean Functions
- Algebraic and Slide Attacks on KeeLoq
- Algebraic Cryptanalysis
- Communication Theory of Secrecy Systems*
- Graph-Based Algorithms for Boolean Function Manipulation
- Improving the variable ordering of OBDDs is NP-complete
- Theory and Applications of Satisfiability Testing
- Advances in Cryptology - CRYPTO 2003
- Algebraic Cryptanalysis of the Data Encryption Standard
- Extended BDD-Based Cryptanalysis of Keystream Generators
- Fast Software Encryption