{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:25:31Z","timestamp":1725899131112},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642385186"},{"type":"electronic","value":"9783642385193"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38519-3_12","type":"book-chapter","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T07:59:28Z","timestamp":1367481568000},"page":"175-197","source":"Crossref","is-referenced-by-count":6,"title":["Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC"],"prefix":"10.1007","author":[{"given":"Michael","family":"Walter","sequence":"first","affiliation":[]},{"given":"Stanislav","family":"Bulygin","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Buchmann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-642-17401-8_14","volume-title":"Progress in Cryptology - INDOCRYPT 2010","author":"G.V. Bard","year":"2010","unstructured":"Bard, G.V., Courtois, N.T., Nakahara Jr., J., Sepehrdad, P., Zhang, B.: Algebraic, AIDA\/Cube and Side Channel Analysis of KATAN Family of Block Ciphers. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol.\u00a06498, pp. 176\u2013196. Springer, Heidelberg (2010)"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A. Bogdanov","year":"2007","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/978-3-642-23951-9_21","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"A. Bogdanov","year":"2011","unstructured":"Bogdanov, A., Kne\u017eevi\u0107, M., Leander, G., Toz, D., Var\u0131c\u0131, K., Verbauwhede, I.: spongent: A Lightweight Hash Function. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol.\u00a06917, pp. 312\u2013325. Springer, Heidelberg (2011)"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-642-10868-6_9","volume-title":"Cryptography and Coding","author":"J. Borghoff","year":"2009","unstructured":"Borghoff, J., Knudsen, L.R., Stolpe, M.: Bivium as a mixed-integer linear programming problem. In: Parker, M.G. (ed.) Cryptography and Coding 2009. LNCS, vol.\u00a05921, pp. 133\u2013152. Springer, Heidelberg (2009)"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Bulygin, S., Buchmann, J.: Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48. In: Lin, et al. (eds.) [11], pp. 54\u201375","DOI":"10.1007\/978-3-642-25513-7_6"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-642-00862-7_13","volume-title":"Topics in Cryptology \u2013 CT-RSA 2009","author":"B. Collard","year":"2009","unstructured":"Collard, B., Standaert, F.-X.: A Statistical Saturation Attack against the Block Cipher PRESENT. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol.\u00a05473, pp. 195\u2013210. Springer, Heidelberg (2009)"},{"key":"12_CR7","series-title":"Engineering and science applications","volume-title":"Decomposition techniques in mathematical programming","author":"A.J. Conejo","year":"2006","unstructured":"Conejo, A.J., Castillo, E., Minguez, R., Garcia-Bertrand, R.: Decomposition techniques in mathematical programming. Engineering and science applications. Springer, Berlin (2006)"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-540-77272-9_10","volume-title":"Cryptography and Coding","author":"N.T. Courtois","year":"2007","unstructured":"Courtois, N.T., Bard, G.V.: Algebraic Cryptanalysis of the Data Encryption Standard. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, vol.\u00a04887, pp. 152\u2013169. Springer, Heidelberg (2007)"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-540-71039-4_6","volume-title":"Fast Software Encryption","author":"N.T. Courtois","year":"2008","unstructured":"Courtois, N.T., Bard, G.V., Wagner, D.: Algebraic and Slide Attacks on KeeLoq. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 97\u2013115. Springer, Heidelberg (2008)"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-540-71039-4_15","volume-title":"Fast Software Encryption","author":"B. Debraize","year":"2008","unstructured":"Debraize, B., Goubin, L.: Guess-and-determine algebraic attack on the self-shrinking generator. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 235\u2013252. Springer, Heidelberg (2008)"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","volume-title":"Cryptology and Network Security","year":"2011","unstructured":"Lin, D., Tsudik, G., Wang, X. (eds.): CANS 2011. LNCS, vol.\u00a07092. Springer, Heidelberg (2011)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Mohamed, M.S.E., Bulygin, S., Zohner, M., Heuser, A., Walter, M., Buchmann, J.: Improved algebraic side-channel attack on AES. In: IEEE HOST 2012, pp. 146\u2013151 (2012)","DOI":"10.1109\/HST.2012.6224335"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Motzkin, T.S., Raiffa, H., Thompson, G.L., Thrall, R.M.: The Double Description Method. In: Kuhn, H.W., Tucker, A.W. (eds.) Contributions to the Theory of Games II. Princeton University Press (1953)","DOI":"10.1515\/9781400881970-004"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-642-34704-7_5","volume-title":"Information Security and Cryptology","author":"N. Mouha","year":"2012","unstructured":"Mouha, N., Wang, Q., Gu, D., Preneel, B.: Differential and linear cryptanalysis using mixed-integer linear programming. In: Wu, C.-K., Yung, M., Lin, D. (eds.) Inscrypt 2011. LNCS, vol.\u00a07537, pp. 57\u201376. Springer, Heidelberg (2012)"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-33027-8_9","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"Y. Oren","year":"2012","unstructured":"Oren, Y., Renauld, M., Standaert, F.-X., Wool, A.: Algebraic side-channel attacks beyond the hamming weight leakage model. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol.\u00a07428, pp. 140\u2013154. Springer, Heidelberg (2012)"},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","year":"2011","unstructured":"Rogaway, P. (ed.): CRYPTO 2011. LNCS, vol.\u00a06841. Springer, Heidelberg (2011)"},{"key":"12_CR17","unstructured":"Simonetti, I., Faug\u00e8re, J.-C., Perret, L.: Algebraic Attack Against Trivium. In: First International Conference on Symbolic Computation and Cryptography, SCC 2008, Beijing, China. LMIB, pp. 95\u2013102 (April 2008)"},{"key":"12_CR18","unstructured":"Soos, M.: Cryptominisat 2.5.0. In: SAT Race Competitive Event Booklet (July 2010)"},{"key":"12_CR19","unstructured":"Soos, M.: Grain of Salt \u2013 an Automated Way to Test Stream Ciphers through SAT Solvers. In: Tools 2010: Proceedings of the Workshop on Tools for Cryptanalysis 2010, pp. 1\u20132 (2010)"},{"key":"12_CR20","unstructured":"Stein, W.A., et al.: Sage Mathematics Software (Version 4.7.2). The Sage Development Team (2011), \n                  \n                    http:\/\/www.sagemath.org"},{"key":"12_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-21554-4_19","volume-title":"Applied Cryptography and Network Security","author":"W. Wu","year":"2011","unstructured":"Wu, W., Zhang, L.: LBlock: A lightweight block cipher. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol.\u00a06715, pp. 327\u2013344. Springer, Heidelberg (2011)"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Yap, H., Khoo, K., Poschmann, A., Henricksen, M.: EPCBC - A Block Cipher Suitable for Electronic Product Code Encryption. In: Lin, et al. (eds.) [11], pp. 76\u201397","DOI":"10.1007\/978-3-642-25513-7_7"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38519-3_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T19:24:07Z","timestamp":1557689047000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38519-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642385186","9783642385193"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38519-3_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}