共 50 条
- [32] Simplifying algebraic attacks with univariate analysis 2011 Information Theory and Applications Workshop, ITA 2011 - Conference Proceedings, 2011, : 153 - 159
- [33] Algebraic attacks over GF(q) PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 84 - 91
- [34] Algebraic Attacks on Filter and Combiner Generators ENHANCING CRYPTOGRAPHIC PRIMITIVES WITH TECHNIQUES FROM ERROR CORRECTING CODES, 2009, 23 : 39 - 48
- [36] Algebraic attacks and decomposition of boolean functions ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 474 - 491
- [39] Feedback shift registers, 2-adic span, and combiners with memory Journal of Cryptology, 1997, 10 : 111 - 147
- [40] Algebraic Attacks Using IP-Solvers COMPUTER ALGEBRA IN SCIENTIFIC COMPUTING, CASC 2013, 2013, 8136 : 401 - 411