{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T12:07:21Z","timestamp":1759147641546},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642174988"},{"type":"electronic","value":"9783642174995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17499-5_12","type":"book-chapter","created":{"date-parts":[[2010,12,7]],"date-time":"2010-12-07T08:12:47Z","timestamp":1291709567000},"page":"298-328","source":"Crossref","is-referenced-by-count":2,"title":["PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware"],"prefix":"10.1007","author":[{"given":"Willi","family":"Geiselmann","sequence":"first","affiliation":[]},{"given":"Kenneth","family":"Matheis","sequence":"additional","affiliation":[]},{"given":"Rainer","family":"Steinwandt","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","first-page":"1209","volume":"11","author":"V.L. Arlazarov","year":"1975","unstructured":"Arlazarov, V.L., Dinic, E.A., Kronrod, M.A., Faradzev, I.A.: On economic construction of the transitive closure of a directed graph. Sov. Math. Dokl.\u00a011, 1209\u20131210 (1975); Original in Russian in Dokl. Akad. Nauk. SSSR 194, 477\u2013488 (1970)","journal-title":"Sov. Math. Dokl."},{"unstructured":"Bernstein, D.J.: Circuits for Integer Factorization: a Proposal (2001), At the time of writing available electronically at, http:\/\/cr.yp.to\/papers\/nfscircuit.pdf","key":"12_CR2"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1007\/978-3-540-74735-2_27","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A. Bogdanov","year":"2007","unstructured":"Bogdanov, A., Eisenbarth, T., Rupp, A.: A Hardware-Assisted Realtime Attack on A5\/2 Without Precomputations. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 394\u2013412. Springer, Heidelberg (2007)"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A. Bogdanov","year":"2007","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Mertens, M.C., Paar, C., Pelzl, J., Rupp, A.: A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2). In: IEEE Symp. on Field-Programmable Custom Computing Machines \u2014 FCCM 2006, Napa, CA, USA (2006)","key":"12_CR5","DOI":"10.1109\/FCCM.2006.12"},{"doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Mertens, M.C., Paar, C., Pelzl, J., Rupp, A.: SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2). In: 2nd Workshop on Special-purpose Hardware for Attacking Cryptographic Systems \u2013 SHARCS 2006 (2006), http:\/\/www.crypto.ruhr-uni-bochum.de\/imperia\/md\/content\/texte\/publications\/conferences\/sharcs2006_matrix.pdf","key":"12_CR6","DOI":"10.1109\/FCCM.2006.12"},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W. Bosma","year":"1997","unstructured":"Bosma, W., Cannon, J.J., Playoust, C.: The Magma Algebra System I: The User Language. Journal of Symbolic Computation\u00a024, 235\u2013265 (1997)","journal-title":"Journal of Symbolic Computation"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/11799313_6","volume-title":"Fast Software Encryption","author":"J. Buchmann","year":"2006","unstructured":"Buchmann, J., Pyshkin, A., Weinmann, R.-P.: A Zero-Dimensional Gr\u00f6bner Basis for AES-128. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 78\u201388. Springer, Heidelberg (2006)"},{"unstructured":"Intel Corporation. Intel\u00ae Xeon\u00ae Processor X7460 (16M Cache, 2.66 GHz, 1066 MHz FSB), http:\/\/ark.intel.com\/Product.aspx?id=36947","key":"12_CR9"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-540-71039-4_6","volume-title":"Fast Software Encryption","author":"N.T. Courtois","year":"2008","unstructured":"Courtois, N.T., Bard, G.V., Wagner, D.: Algebraic and Slide Attacks on KeeLoq. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 97\u2013115. Springer, Heidelberg (2008)"},{"unstructured":"Electronic\u00a0Frontier Foundation. Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design. OReilly & Associates, Sebastopol (July 1998)","key":"12_CR11"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/11545262_9","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"J. Franke","year":"2005","unstructured":"Franke, J., Kleinjung, T., Paar, C., Pelzl, J., Priplata, C., Stahlke, C.: SHARK: A Realizable Special Hardware Sieving Device for Factoring 1024-Bit Integers. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 119\u2013130. Springer, Heidelberg (2005)"},{"unstructured":"Geiselmann, W., Matheis, K., Steinwandt, R.: PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware. Cryptology ePrint Archive: Report 2009\/222 (2010), http:\/\/eprint.iacr.org\/2009\/222","key":"12_CR13"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/11545262_10","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"W. Geiselmann","year":"2005","unstructured":"Geiselmann, W., Shamir, A., Steinwandt, R., Tromer, E.: Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 131\u2013146. Springer, Heidelberg (2005)"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-540-24660-2_22","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"W. Geiselmann","year":"2004","unstructured":"Geiselmann, W., Steinwandt, R.: Yet Another Sieving Device. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol.\u00a02964, pp. 278\u2013291. Springer, Heidelberg (2004)"},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/978-3-540-72540-4_27","volume-title":"Advances in Cryptology - EUROCRYPT 2007","author":"W. Geiselmann","year":"2007","unstructured":"Geiselmann, W., Steinwandt, R.: Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol.\u00a04515, pp. 466\u2013481. Springer, Heidelberg (2007)"},{"issue":"11","key":"12_CR17","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.1109\/TC.2008.80","volume":"75","author":"T. G\u00fcneysu","year":"2008","unstructured":"G\u00fcneysu, T., Kasper, T., Novotn\u00fd, M., Paar, C., Rupp, A.: Cryptanalysis with COPACOBANA. IEEE Transactions on Computers\u00a075(11), 1498\u20131513 (2008)","journal-title":"IEEE Transactions on Computers"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/3-540-45539-6_3","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"A.K. Lenstra","year":"2000","unstructured":"Lenstra, A.K., Shamir, A.: Analysis and Optimization of the TWINKLE Factoring Device. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 35\u201352. Springer, Heidelberg (2000)"},{"key":"12_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-36178-2_1","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"A.K. Lenstra","year":"2002","unstructured":"Lenstra, A.K., Shamir, A., Tomlinson, J., Tromer, E.: Analysis of Bernstein\u2019s Factorization Circuit. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 1\u201326. Springer, Heidelberg (2002)"},{"unstructured":"National Institute of Standards and Technology. Federal Information Processing Standards Publication 197. Specification for the ADVANCED ENCRYPTION STANDARD (AES) (November 2001)","key":"12_CR20"},{"key":"12_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/978-3-540-77360-3_15","volume-title":"Selected Areas in Cryptography","author":"H. Raddum","year":"2007","unstructured":"Raddum, H.: MRHS Equation Systems. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol.\u00a04876, pp. 232\u2013245. Springer, Heidelberg (2007)"},{"unstructured":"Raddum, H., Semaev, I.: Solving MRHS linear equations. Cryptology ePrint Archive, Report 2007\/285 (2007), http:\/\/eprint.iacr.org\/2007\/285","key":"12_CR22"},{"key":"12_CR23","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s10623-008-9180-z","volume":"49","author":"H. Raddum","year":"2008","unstructured":"Raddum, H., Semaev, I.: Solving Multiple Right Hand Sides linear equations. Designs, Codes and Cryptography\u00a049, 147\u2013160 (2008); Preprint available in [22]","journal-title":"Designs, Codes and Cryptography"},{"unstructured":"Schoonen, A.C.C.: Multiple right-hand side equation. Master\u2019s thesis, Eindhoven University of Technology, Department of Mathematics and Computer Science (May 2008), http:\/\/alexandria.tue.nl\/extra1\/afstversl\/wsk-i\/schoonen2008.pdf","key":"12_CR24"},{"unstructured":"Semaev, I.: Sparse Boolean equations and circuit lattices. Presentation at Int. Workshop on Coding and Cryptography WCC 2009, Ullensvang (Norway) (May 2009)","key":"12_CR25"},{"unstructured":"Semaev, I.: Sparse Boolean equations and circuit lattices. Cryptology ePrint Archive, Report 2009\/252 (2009), http:\/\/eprint.iacr.org\/2009\/252","key":"12_CR26"},{"key":"12_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-48059-5_2","volume-title":"Cryptographic Hardware and Embedded Systems","author":"A. Shamir","year":"1999","unstructured":"Shamir, A.: Factoring Large Numbers with the TWINKLE Device. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 2\u201312. Springer, Heidelberg (1999)"},{"key":"12_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-45146-4_1","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"A. Shamir","year":"2003","unstructured":"Shamir, A., Tromer, E.: Factoring Large Numbers with the TWIRL Device. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 1\u201326. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Transactions on Computational Science X"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17499-5_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:54:04Z","timestamp":1606168444000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17499-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642174988","9783642174995"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17499-5_12","relation":{},"ISSN":["0302-9743","1866-4741"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1866-4741"}],"subject":[],"published":{"date-parts":[[2010]]}}}