The purpose of this paper is to calculate the running time of dense boolean matrix operations, as used in stream cipher cryptanalysis and integer factorization. Several variations of Gaussian Elimination, Strassen\u27s Algorithm and the Method of Four Russians are analyzed. In particular, we demonstrate that Strassen\u27s Algorithm is actually slower than the Four Russians algorithm for matrices of the sizes encountered in these problems. To accomplish this, we introduce a new model for tabulating the running time, tracking matrix reads and writes rather than field operations, and retaining the coefficients rather than dropping them. Furthermore, we introduce an algorithm known heretofore only orally, a ``Modified Method of Four Russians\u2...
In this paper,we give an example of how symbolic computation are used to analyze the block cipher PR...
This thesis studies the secure polynomial multiplication methods related to the article Batch Binary...
International audienceA fundamental problem in computer science is to find all the common zeroes of ...
Solving a dense linear system of boolean equations is the final step of several cryptanalytic attac...
This article gives improved algorithms to evaluate a multivariate Boolean polynomial over all the...
A general technique to protect a cryptographic algorithm against side-channel attacks consists in ma...
In this study, the authors analyse with respect to algebraic attacks a small-scale version of the st...
This paper presents an algebraic cryptanalysis of nonlinear filter generator. A linear shift registe...
Minimizing the Boolean circuit implementation of a given cryptographic function is an important issu...
This dissertation contains algorithms for solving linear and polynomial systems of equations over GF...
A fundamental problem in computer science is to find all the common zeroes of m quadratic poly-nomia...
Stream ciphers are the oldest technique in cryptography subject and still applicable in the modern e...
In this paper we propose models of combinatorial algorithms for the Boolean Matrix Multiplication (B...
This thesis is a contribution to the field of algebraic cryptanalysis. Specifically the following to...
Our paper describes a particular class of digital cipher system that generates encryption keys using...
In this paper,we give an example of how symbolic computation are used to analyze the block cipher PR...
This thesis studies the secure polynomial multiplication methods related to the article Batch Binary...
International audienceA fundamental problem in computer science is to find all the common zeroes of ...
Solving a dense linear system of boolean equations is the final step of several cryptanalytic attac...
This article gives improved algorithms to evaluate a multivariate Boolean polynomial over all the...
A general technique to protect a cryptographic algorithm against side-channel attacks consists in ma...
In this study, the authors analyse with respect to algebraic attacks a small-scale version of the st...
This paper presents an algebraic cryptanalysis of nonlinear filter generator. A linear shift registe...
Minimizing the Boolean circuit implementation of a given cryptographic function is an important issu...
This dissertation contains algorithms for solving linear and polynomial systems of equations over GF...
A fundamental problem in computer science is to find all the common zeroes of m quadratic poly-nomia...
Stream ciphers are the oldest technique in cryptography subject and still applicable in the modern e...
In this paper we propose models of combinatorial algorithms for the Boolean Matrix Multiplication (B...
This thesis is a contribution to the field of algebraic cryptanalysis. Specifically the following to...
Our paper describes a particular class of digital cipher system that generates encryption keys using...
In this paper,we give an example of how symbolic computation are used to analyze the block cipher PR...
This thesis studies the secure polynomial multiplication methods related to the article Batch Binary...
International audienceA fundamental problem in computer science is to find all the common zeroes of ...