{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T11:25:06Z","timestamp":1747049106888},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2009,12,15]],"date-time":"2009-12-15T00:00:00Z","timestamp":1260835200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2010,4]]},"DOI":"10.1007\/s10207-009-0099-9","type":"journal-article","created":{"date-parts":[[2009,12,14]],"date-time":"2009-12-14T02:54:47Z","timestamp":1260759287000},"page":"127-135","source":"Crossref","is-referenced-by-count":18,"title":["Counting equations in algebraic attacks on block ciphers"],"prefix":"10.1007","volume":"9","author":[{"given":"Lars R.","family":"Knudsen","sequence":"first","affiliation":[]},{"given":"Charlotte V.","family":"Miolane","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,15]]},"reference":[{"key":"99_CR1","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.ffa.2005.06.007","volume":"1","author":"E. Andersen Henning","year":"2007","unstructured":"Andersen Henning E.: On puncturing of codes from Norm-Trace curves. Finite Fields Appl. 1, 136\u2013157 (2007)","journal-title":"Finite Fields Appl."},{"key":"99_CR2","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1016\/j.jsc.2005.09.007","volume":"41","author":"B. Buchberger","year":"2006","unstructured":"Buchberger B.: Bruno Buchberger\u2019s PhD thesis 1965: an algorithm for finding the basis elements of the residue class ring of a zero dimensional polynomial ideal. J. Symb. Comput. 41, 475\u2013511 (2006)","journal-title":"J. Symb. Comput."},{"key":"99_CR3","doi-asserted-by":"crossref","unstructured":"Cid, C., Leurent, G.: An analysis of the XSL algorithm. In: Roy, B.K. (ed.) Advances in Cryptology\u2014ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4\u20138, 2005, Proceedings. Lecture Notes in Computer Science, vol. 3788, pp. 333\u2013352. Springer (2005)","DOI":"10.1007\/11593447_18"},{"key":"99_CR4","doi-asserted-by":"crossref","unstructured":"Cid, C., Murphy, S., Robshaw, M.J.B.: Small scale variants of the AES. In: Gilbert, H., Handschuh, H. (eds.) Fast Software Encryption, 12th International Workshop, Paris,France. Lecture Notes in Computer Science, vol. 3557, pp. 145\u2013162. Springer (2005)","DOI":"10.1007\/11502760_10"},{"key":"99_CR5","doi-asserted-by":"crossref","unstructured":"Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) Advances in Cryptology\u2014EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4\u20138, 2003, Proceedings. Lecture Notes in Computer Science, vol. 2656, pp. 345\u2013359. Springer (2003)","DOI":"10.1007\/3-540-39200-9_21"},{"key":"99_CR6","doi-asserted-by":"crossref","unstructured":"Courtois, N.T., Klimov, A., Patarin, J., Shamir, A.: Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: Preneel, B. (ed.) Advances in Cryptology\u2014EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14\u201318, 2000, Proceedings. Lecture Notes in Computer Science, vol. 1807, pp. 392\u2013407. Springer (2000)","DOI":"10.1007\/3-540-45539-6_27"},{"key":"99_CR7","doi-asserted-by":"crossref","unstructured":"Courtois, N.T., Pieprzyk, J.: Cryptanalysis of block ciphers with overdefined system of equations. In: Zheng, Y. (ed.) Advances in Cryptology\u2014ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1\u20135, 2002, Proceedings. Lecture Notes in Computer Science, vol. 2501, pp. 267\u2013287. Springer (2002)","DOI":"10.1007\/3-540-36178-2_17"},{"key":"99_CR8","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-6911-1","volume-title":"Using Algebraic Geometry","author":"D. Cox","year":"1998","unstructured":"Cox D., Little J., OShea D.: Using Algebraic Geometry, 1st edn. Springer, New York (1998)","edition":"1"},{"key":"99_CR9","volume-title":"Ideals, Varieties, and Algorithms, An Introduction to Computational Geometry and Commutative Algebra","author":"D. Cox","year":"2005","unstructured":"Cox D., Little J., OShea D.: Ideals, Varieties, and Algorithms, An Introduction to Computational Geometry and Commutative Algebra, 2nd edn. Springer, New York (2005)","edition":"2"},{"key":"99_CR10","doi-asserted-by":"crossref","unstructured":"Diem, C.: The XL-algorithm and a conjecture from commutative algebra. In: Lee, P.J. (ed.) Advances in Cryptology\u2014ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5\u20139, 2004, Proceedings. Lecture Notes in Computer Science, vol. 3329, pp. 323\u2013337. Springer (2004)","DOI":"10.1007\/978-3-540-30539-2_23"},{"key":"99_CR11","doi-asserted-by":"crossref","unstructured":"Lim, C.-W., Khoo, K.: An analysis of XSL applied to BES. In: Biryukov, A. (ed.) Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26\u201328, 2007, Revised Selected Papers. Lecture Notes in Computer Science, vol. 4593, pp. 242\u2013253. Springer (2007)","DOI":"10.1007\/978-3-540-74619-5_16"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0099-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-009-0099-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0099-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T07:01:24Z","timestamp":1559113284000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-009-0099-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,15]]},"references-count":11,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,4]]}},"alternative-id":["99"],"URL":"https:\/\/doi.org\/10.1007\/s10207-009-0099-9","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,12,15]]}}}