Bard, Gregory V.
Algebraic Cryptanalysis
1. Introduction: How to Use this Book
Gregory V. Bard
2. The Block Cipher Keeloq and Algebraic Attacks
Gregory V. Bard
3. The Fixed-Point Attack
Gregory V. Bard
4. Iterated Permutations
Gregory V. Bard
5. Stream Ciphers
Gregory V. Bard
6. Some Basic Facts about Linear Algebra over mathbb{G}mathbb{F}(2)
Gregory V. Bard
7. The Complexity of mathbb{G}mathbb{F}(2)-Matrix Operations
Gregory V. Bard
8. On the Exponent of Certain Matrix Operations
Gregory V. Bard
9. The Method of Four Russians
Gregory V. Bard
10. The Quadratic Sieve
Gregory V. Bard
11. Strategies for Polynomial Systems
Gregory V. Bard
12. Algorithms for Solving Polynomial Systems
Gregory V. Bard
13. Converting MQ to CNF-SAT
Gregory V. Bard
14. How do SAT-Solvers Operate?
Gregory V. Bard
15. Applying SAT-Solvers to Extension Fields of Low Degree
Gregory V. Bard
Keywords: Computer Science, Data Structures, Cryptology and Information Theory, Field Theory and Polynomials, Linear and Multilinear Algebras, Matrix Theory, Data Encryption, Algebraic Geometry, Systems and Data Security
- Author(s)
- Bard, Gregory V.
- Publisher
- Springer
- Publication year
- 2009
- Language
- en
- Edition
- 1
- Page amount
- 26 pages
- Category
- Information Technology, Telecommunications
- Format
- Ebook
- eISBN (PDF)
- 9780387887579