Introducing a new variant of fast algebraic attacks and minimizing their successive data complexity, MycryptAC10] Martin Albrecht and Carlos Cid. Cold Boot Key Recovery using Polynomial System Solving with Noise 2nd International Conference on Symbolic Computation and Cryptography, 2010. [AF05] Gwénolé Ars and Jean-Charles Faugère. Algebraic Immunities of functions over finite fields, pp.16-32, 2000. ,
URL : https://hal.archives-ouvertes.fr/hal-01351381
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms Constructing Single-and Multi-Output Boolean Functions with Maximal Immunity, Proceedings of ICALP 2006, pp.180-191, 2000. ,
Applications aux codes correcteurs et` et` a la cryptographie Correlation Power Analysis with a Leakage Model The MAGMA algebra system: the user language, Gwénolé Ars. Applications des bases de Gröbner en cryptographie Etude des systèmes algébriques surdéterminés CHES'04BCP97] Wieb Bosma, pp.16-29235, 1997. ,
On the Complexity of Gröbner Basis Computation of Semi-Regular Overdetermined Algebraic Equations Asymptotic Behaviour of the Degree of Regularity of Semi-Regular Polynomial Systems, Proc. of International Conference on Polynomial System Solving (ICPSS) Proc. of MEGA 2005, Eighth Inter. Symposium on Effective Methods in Algebraic Geometry, pp.71-75, 2004. ,
PRESENT: An Ultra-Lightweight Block Cipher Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection, CHES'07 INDOCRYPT, pp.251-265, 2007. ,
Improved Side-Channel Collision Attacks on AES, Selected Areas in Cryptography, pp.84-95, 2007. ,
DOI : 10.1007/978-3-540-77360-3_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.137.1652
Multiple-Differential Side- Channel Collision Attacks on AES, Cryptographic Hardware and Embedded Systems -CHES 2008 Proceedings, pp.30-44, 2008. ,
On the algebraic immunities and higher order nonlinearities of vectorial Boolean functions, volume 13 of NATO Science for Peace and Security Series, D: Information and Communication Security, pp.104-116, 2009. ,
Towards Sound Approaches to Counteract Power-Analysis Attacks, Vectorial Boolean Functions for Cryptography Advances in Cryptology -CRYPTO '99, 19th Annual International Cryptology Conference ProceedingsCL05] Carlos Cid and Gaëtan Leurent. An Analysis of the XSL Algorithm. In ASIACRYPT, pp.398-469, 1999. ,
Algebraic Attacks on Stream Ciphers with Linear Feedback [CP02] Nicolas Courtois and Josef Pieprzyk Cryptanalysis of Block Ciphers with Overdefined Systems of Equations A New Efficient Algorithm for Computing Gröbner bases without reduction to zero (F5), Ideals, Varieties, and Algorithms: An Introduction to Computational Algebraic Geometry and Commutative Algebra EUROCRYPT ASIACRYPTFau99] Jean-Charles Faugère. A New Efficient Algorithm for Computing Gröbner bases Journal of Pure and Applied Algebra Proceedings of the 2002 International Symposium on Symbolic and Algebraic Computation , ISSAC '02, pp.345-359, 1999. ,
Cryptanalysis of MinRank Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases Algebraic Immunity of S-Boxes and Augmented Functions [FP06a] Jean-Charles Faugère and Ludovic Perret. Cryptanalysis of 2R -Schemes, CRYPTO FSE CRYPTOFP06b] Jean-Charles Faugère and Ludovic Perret. Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects EUROCRYPT Selected Areas in Cryptography, pp.280-296, 2003. ,
Correlation-Enhanced Power Analysis Collision Attack, CHES'10, 2010. ,
DOI : 10.1007/978-3-642-15031-9_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.187.6607
Power Analysis Attacks : Revealing the Secrets of Smart Cards [Off06] Office of State Commercial Cryptography Administration . The SMS4 block cipher, 2006. ,
Algebraic Side-Channel Analysis in the Presence of Errors DPA Attacks and S-Boxes Algebraic Side-Channel Attacks Representation-, leakage-and cipher-dependencies in algebraic side-channel attacks, CHES'10, 2010. [Pro05] Emmanuel Prouff FSE Inscrypt 2009 ACNS 2010 Industrial Track, pp.424-441, 2005. ,
Algebraic Side- Channel Attacks on the AES: Why Time also Matters in DPA, CHES'09, pp.97-111, 2009. ,
A Collision-Attack on AES Combining Side Channel and Differential Attack A new class of collision attacks and its application to DES, CHES'04SNC09] Mate Soos, Karsten Nohl, and Claude Castelluccia . Extending SAT Solvers to Cryptographic Problems. In SAT Fast Software Encryption FSE 03, volume LNCS 2887 of LNCS, pp.163-175, 2003. ,