Numerical solvers and cryptanalysis
From MaRDI portal
Publication:3400069
DOI10.1515/JMC.2009.015zbMath1234.94055OpenAlexW2019277591WikidataQ22131853 ScholiaQ22131853MaRDI QIDQ3400069
Mario Lamberger, Tomislav Nad, Vincent Rijmen
Publication date: 5 February 2010
Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1515/jmc.2009.015
optimizationstream cipherscryptanalysisBoolean equationsnumerical analysisnumerical solvertriviumbivium
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Nonlinear algebraic or transcendental equations (65H99)
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Lipschitzian optimization without the Lipschitz constant
- On the convergence of interior-reflective Newton methods for nonlinear minimization subject to bounds
- Attacking Bivium Using SAT Solvers
- Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
- Cube Attacks on Tweakable Black Box Polynomials
This page was built for publication: Numerical solvers and cryptanalysis