Results 101 to 110 of about 687 (113)
Some of the next articles are maybe not open access.
Attacking Bivium and Trivium with the Characteristic Set Method
International Conference on Cryptology in Africa, 2011In this paper we utilize an algebraic method called the characteristic set method to attack Bivium and Trivium in the guess-and-determine way. Our attack focuses on recovering the internal states of these two ciphers. We theoretically analyze the performance of different guessing strategies in the guess-and-determine method and present a good one.
Zhenyu Huang, Dongdai Lin
openaire +2 more sources
Bivium as a Mixed-Integer Linear Programming Problem
IMA Conference on Cryptography and Coding, 2009Trivium is a stream cipher proposed for the eSTREAM project. Raddum introduced some reduced versions of Trivium, named Bivium A and Bivium B. In this article we present a numerical attack on the Biviums. The main idea is to transform the problem of solving a sparse system of quadratic equations over GF (2) into a combinatorial optimization problem.
Julia Borghoff +2 more
openaire +2 more sources
Deux voyages en un: Octovien de Saint-Gelais et le problème du bivium
Le Moyen FrançaisF. Cornilliat
openaire +2 more sources
Ichnotaxonomy of new boring taxa: linking insect activity and fossil resins formation
PalaeoentomologyThe fossil record reveals palaeoecological interactions between plants and insects. This study describes a singular conifer xylite specimen from the Baltic amber-bearing deposits, with preserved resin ducts and cylindrical insect borings designated as ...
Błażej Bojarski +2 more
semanticscholar +1 more source
Algebraic cryptanalysis of symmetric ciphers: modeling and multistep solving strategies
Serdica Mathematical JournalThis paper presents a systematized study of algebraic cryptanalysis for symmetric ciphers. It explains how encryption algorithms can be expressed as systems of polynomial equations over finite fields and analyzed using algebraic and logical solvers.
Roberto La Scala, S. Tiwari
semanticscholar +1 more source
International Conference on Theory and Applications of Satisfiability Testing, 2008
H. K. Büning, Xishun Zhao
semanticscholar +1 more source
H. K. Büning, Xishun Zhao
semanticscholar +1 more source
A Volunteer-Computing-Based Grid Architecture Incorporating Idle Resources of Computational Clusters
Numerical Analysis and Its Applications, 2016O. Zaikin +4 more
semanticscholar +1 more source

