Attacking Bivium and Trivium with the Characteristic Set Method
From MaRDI portal
Publication:3011904
DOI10.1007/978-3-642-21969-6_5zbMath1280.94070OpenAlexW1670500909MaRDI QIDQ3011904
Publication date: 29 June 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-21969-6_5
Related Items (8)
Stream/block ciphers, difference equations and algebraic attacks ⋮ A New Method for Solving Polynomial Systems with Noise over $\mathbb{F}_2$ and Its Applications in Cold Boot Key Recovery ⋮ Chordal graphs in triangular decomposition in top-down style ⋮ Parametric equation solving and quantifier elimination in finite fields with the characteristic set method ⋮ On the efficiency of solving Boolean polynomial systems with the characteristic set method ⋮ Speeding up the GVW algorithm via a substituting method ⋮ On the Chordality of Simple Decomposition in Top-Down Style ⋮ Analyses and implementations of chordality-preserving top-down algorithms for triangular decomposition
Uses Software
Cites Work
- A characteristic set method for solving Boolean equations and applications in cryptanalysis of stream ciphers
- Optimising Gröbner bases on Bivium
- Basic principles of mechanical theorem proving in elementary geometries
- Attacking Bivium Using SAT Solvers
- Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
- Cube Attacks on Tweakable Black Box Polynomials
- Two Trivial Attacks on Trivium
This page was built for publication: Attacking Bivium and Trivium with the Characteristic Set Method