共 15 条
- [1] Armknecht F., Krause M., Algebraic attacks on combiners with memory, LNCS, 2729, pp. 162-175, (2003)
- [2] Aumasson J.-P., On a bias of Rabbit, Proc. SASC, (2007)
- [3] Courtois N., Fast algebraic attacks on stream ciphers with linear feedback, LNCS, 2729, pp. 176-194, (2003)
- [4] Courtois N., Higher order correlation attacks, XL algorithm and cryptoanalysis of toyocrypt, LNCS, 2587, pp. 182-199, (2003)
- [5] Courtois N., Meier W., Algebraic attacks on stream ciphers with linear feedback, LNCS, 2656, pp. 345-359, (2003)
- [6] Courtois N., Pieprzyk J., Cryptanalysis of block ciphers with overdefined systems of equations, LNCS, 2501, pp. 267-287, (2002)
- [7] Daemen J., Cipher and hash function design strategies based on linear and differential cryptanalysis, (1995)
- [8] Masaglia G., A battery of tests for random number generators, (1996)
- [9] Matsui M., Linear cryptanalysis method for DES cipher, LNCS, 765, pp. 386-397, (1994)
- [10] Meier W., Staffelbach O., Fast correlation attacks on stream ciphers, LNCS, 330, pp. 301-314, (1988)