{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T19:00:55Z","timestamp":1648753255067},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,7,9]],"date-time":"2015-07-09T00:00:00Z","timestamp":1436400000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Swiss National Foundation","award":["200021_134860\/1"],"award-info":[{"award-number":["200021_134860\/1"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1007\/s10207-015-0295-8","type":"journal-article","created":{"date-parts":[[2015,7,8]],"date-time":"2015-07-08T16:26:03Z","timestamp":1436372763000},"page":"51-65","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["On selection of samples in algebraic attacks and a new technique to find hidden low degree equations"],"prefix":"10.1007","volume":"15","author":[{"given":"Petr","family":"Su\u0161il","sequence":"first","affiliation":[]},{"given":"Pouyan","family":"Sepehrdad","sequence":"additional","affiliation":[]},{"given":"Serge","family":"Vaudenay","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Courtois","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,9]]},"reference":[{"key":"295_CR1","first-page":"164","volume":"2011","author":"MR Albrecht","year":"2011","unstructured":"Albrecht, M.R., Cid, C., Faug\u00e8re, J.-C., Perret, L.: On the relation between the mutant strategy and the normal selection strategy in Gr\u00f6bner basis algorithms. IACR Cryptol. ePrint Arch. 2011, 164 (2011)","journal-title":"IACR Cryptol. ePrint Arch."},{"issue":"8","key":"295_CR2","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.jsc.2012.01.002","volume":"47","author":"MR Albrecht","year":"2012","unstructured":"Albrecht, M.R., Cid, C., Faug\u00e8re, J.-C., Perret, L.: On the relation between the MXL family of algorithms and Gr\u00f6bner basis algorithms. J. Symb. Comput. 47(8), 926\u2013941 (2012)","journal-title":"J. Symb. Comput."},{"key":"295_CR3","doi-asserted-by":"crossref","unstructured":"Al-Hinai, S., Dawson, E., Henricksen, M., Simpson, L.-R.: On the security of the LILI family of stream ciphers against algebraic attacks. In: Josef, P., Hossein, G., Dawson, E. (eds.) ACISP 07, vol. 4586 of LNCS, pp. 11\u201328, Townsville, Australia, July 2\u20134. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-73458-1_2"},{"key":"295_CR4","doi-asserted-by":"crossref","unstructured":"Ars, G., Faug\u00e8re, J.-C., Imai, H., Kawazoe, M., Sugita, M.: Comparison between XL and Gr\u00f6bner basis algorithms. In: Pil\u00a0Joong, L. (ed.) ASIACRYPT 2004, vol. 3329 of LNCS, pp. 338\u2013353, Jeju Island, Korea, December 5\u20139. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-30539-2_24"},{"key":"295_CR5","doi-asserted-by":"crossref","unstructured":"Aumasson, J.-P., Dinur, I., Meier, W., Shamir, A.: Cube testers and key recovery attacks on reduced-round MD6 and Trivium. In: Orr, D. (ed.) FSE\u00a02009, vol. 5665 of LNCS, pp. 1\u201322, Leuven, Belgium, February 22\u201325. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-03317-9_1"},{"key":"295_CR6","doi-asserted-by":"crossref","unstructured":"Bard, G.-V., Courtois, N., Nakahara, J., Sepehrdad, P., Zhang, B.: Algebraic, AIDA\/cube and side channel analysis of KATAN family of block ciphers. In: Guang, G., Kishan-Chand G. (eds.) INDOCRYPT\u00a02010, vol. 6498 of LNCS, pp. 176\u2013196, Hyderabad, India, December 12\u201315. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-17401-8_14"},{"key":"295_CR7","unstructured":"Bardet, M., Faug\u00e8re, J.-C., Salvy, B., Yang, B.-Y.: Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems. In: MEGA\u201905, 2005. Eighth International Symposium on Effective Methods in Algebraic Geometry, Porto Conte, Alghero, Sardinia (Italy), May 27th \u2013 June 1st"},{"issue":"1","key":"295_CR8","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.jco.2012.07.001","volume":"29","author":"M Bardet","year":"2013","unstructured":"Bardet, M., Faug\u00e8re, J.-C., Salvy, B., Spaenlehauer, P.-J.: On the complexity of solving quadratic boolean systems. J. Complex. 29(1), 53\u201375 (2013)","journal-title":"J. Complex."},{"key":"295_CR9","doi-asserted-by":"crossref","unstructured":"Canni\u00e8re, C.T.: A stream cipher construction inspired by block cipher design principles. In: Sokratis, K.K., Javier, L., Michael, B., Stefanos, G., Bart P. (eds.) Information Security, vol. 4176 of Lecture Notes in Computer Science, pp. 171\u2013186. Springer, Berlin Heidelberg (2006)","DOI":"10.1007\/11836810_13"},{"key":"295_CR10","doi-asserted-by":"crossref","unstructured":"Cheng, C.-M., Chou, T., Niederhagen, R., Yang, B.-Y.: Solving quadratic equations with XL on parallel architectures. In: Emmanuel, P., Patrick, S. (eds.) CHES\u00a02012, vol. 7428 of LNCS, pp. 356\u2013373, Leuven, Belgium, September 9\u201312. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-33027-8_21"},{"key":"295_CR11","doi-asserted-by":"crossref","unstructured":"Choy, J., Yap, H., Khoo, K.: An analysis of the compact XSL attack on BES and embedded SMS4. In: Juan, A.G., Atsuko, M., Akira, O. (eds.) CANS 09, vol. 5888 of LNCS, pp. 103\u2013118, Kanazawa, Japan, December 12\u201314. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-10433-6_8"},{"key":"295_CR12","doi-asserted-by":"crossref","unstructured":"Cid, C., Leurent, G.: An analysis of the XSL algorithm. In: Bimal, K.R. (ed.) ASIACRYPT 2005, vol. 3788 of LNCS, pp. 333\u2013352, Chennai, India, December 4\u20138. Springer, Berlin (2005)","DOI":"10.1007\/11593447_18"},{"key":"295_CR13","doi-asserted-by":"crossref","unstructured":"Courtois, N., Bard, G.-V., Wagner, D.: Algebraic and slide attacks on KeeLoq. In: Kaisa, N. (ed.) FSE\u00a02008, vol. 5086 of LNCS, pp. 97\u2013115, Lausanne, Switzerland, February 10\u201313. Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-71039-4_6"},{"key":"295_CR14","doi-asserted-by":"crossref","unstructured":"Courtois, N., Bard, G.-V.: Algebraic cryptanalysis of the data encryption standard. In: Steven, D.G. (eds.) 11th IMA International Conference on Cryptography and Coding, vol. 4887 of LNCS, pp. 152\u2013169, Cirencester, UK, December 18\u201320. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-77272-9_10"},{"key":"295_CR15","doi-asserted-by":"crossref","unstructured":"Courtois, N., Debraize, B.: Algebraic description and simultaneous linear approximations of addition in Snow 2.0. In: Liqun, C., Mark-Dermot, R., Guilin, W. (eds.) ICICS 08, vol. 5308 of LNCS, pp. 328\u2013344, Birmingham, UK, October 20\u201322. Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-88625-9_22"},{"key":"295_CR16","doi-asserted-by":"crossref","unstructured":"Courtois, N., Mourouzis, T., Song, G., Sepehrdad, P., Susil, P.: Combined algebraic and truncated differential cryptanalysis on reduced-round simon. In: Mohammad, S.O., Andreas, H., Pierangela, S. (eds.) SECRYPT 2014\u2014Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014, pp. 399\u2013404. SciTePress (2014)","DOI":"10.5220\/0005064903990404"},{"key":"295_CR17","doi-asserted-by":"crossref","unstructured":"Courtois, N., Pieprzyk, J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: Yuliang, Z., (eds.) ASIACRYPT\u00a02002, vol. 2501 of LNCS, pp. 267\u2013287. Queenstown, New Zealand, December 1\u20135. Springer, Berlin (2002)","DOI":"10.1007\/3-540-36178-2_17"},{"key":"295_CR18","doi-asserted-by":"crossref","unstructured":"Courtois, N.-T., Pouyan, S., Petr S., Serge V.: ElimLin algorithm revisited. In: Anne, C. (ed.) FSE\u00a02012, vol. 7549 of LNCS, pp. 306\u2013325, Washington, DC, USA, March\u00a019\u201321. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-34047-5_18"},{"key":"295_CR19","unstructured":"Courtois, N.-T.: A New Frontier in Symmetric Cryptanalysis. Invited talk, Indocrypt, (2008). http:\/\/www.nicolascourtois.com\/papers\/front_indocrypt08_2p.pdf"},{"key":"295_CR20","doi-asserted-by":"crossref","unstructured":"Courtois, N.: Algebraic attacks over GF $$(2^{k})$$ ( 2 k ) , application to HFE challenge 2 and Sflash-v2. In: Feng, B., Robert, D., Jianying Z. (eds.) PKC\u00a02004, vol. 2947 of LNCS, pp. 201\u2013217, Singapore, March 1\u20134. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-24632-9_15"},{"key":"295_CR21","doi-asserted-by":"crossref","unstructured":"Courtois, N.: Higher order correlation attacks, XL algorithm and cryptanalysis of toyocrypt. In: Pil-Joong, L., Chae-Hoon, L. (eds.) ICISC 02, vol. 2587 of LNCS, pp. 182\u2013199, Seoul, Korea, November 28\u201329. Springer, Berlin (2002)","DOI":"10.1007\/3-540-36552-4_13"},{"key":"295_CR22","doi-asserted-by":"crossref","unstructured":"De Canni\u00e8re, C., Dunkelman, O., Kne\u017eevi\u0107, M.: KATAN and KTANTAN - a family of small and efficient hardware-oriented block ciphers. In: Christophe, C., Kris, G. (eds.) CHES\u00a02009, vol. 5747 of LNCS, pp. 272\u2013288, Lausanne, Switzerland, September 6\u20139. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-04138-9_20"},{"key":"295_CR23","doi-asserted-by":"crossref","unstructured":"Dinur, I., Shamir, A.: Breaking grain-128 with dynamic cube attacks. In: Antoine, J. (ed.) FSE\u00a02011, vol. 6733 of LNCS, pp. 167\u2013187, Lyngby, Denmark, February 13\u201316. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-21702-9_10"},{"key":"295_CR24","doi-asserted-by":"crossref","unstructured":"Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Antoine, J. (ed.) EUROCRYPT\u00a02009, vol. 5479 of LNCS, pp. 278\u2013299, Cologne, Germany, April 26\u201330. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-01001-9_16"},{"key":"295_CR25","first-page":"127","volume":"2009","author":"I Dinur","year":"2009","unstructured":"Dinur, I., Shamir, A.: Side channel cube attacks on block ciphers. IACR Cryptol. ePrint Arch. 2009, 127 (2009)","journal-title":"IACR Cryptol. ePrint Arch."},{"issue":"3\u20134","key":"295_CR26","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/s12095-012-0068-4","volume":"4","author":"I Dinur","year":"2012","unstructured":"Dinur, I., Shamir, A.: Applying cube attacks to stream ciphers in realistic scenarios. Cryptogr. Commun. 4(3\u20134), 217\u2013232 (2012)","journal-title":"Cryptogr. Commun."},{"key":"295_CR27","doi-asserted-by":"crossref","unstructured":"Erickson, J., Ding, J., Christensen, C.: Algebraic cryptanalysis of SMS4: Gr\u00f6bner basis attack and SAT attack compared. In: Donghoon, L., Seokhie, H. (eds.) ICISC 09, vol. 5984 of LNCS, pp. 73\u201386, Seoul, Korea, December 2\u20134. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-14423-3_6"},{"key":"295_CR28","doi-asserted-by":"crossref","unstructured":"Faug\u00e8re, J.-C., Perret, L.: Algebraic cryptanalysis of curry and flurry using correlated messages. In: Bao, F., Yung, M., Lin, D., Jing, J. (eds.) Information Security and Cryptology. Lecture Notes in Computer Science, vol. 6151, pp. 266\u2013277. Springer, Berlin Heidelberg (2010)","DOI":"10.1007\/978-3-642-16342-5_19"},{"key":"295_CR29","doi-asserted-by":"crossref","unstructured":"Faug\u00e8re, J.-C.: A new efficient algorithm for computing Gr\u00f6bner bases without reduction to zero (F5). In: ISSAC 02: Proceedings of the 2002 International Symposium on Symbolic and Algebraic Computation, pp. 75\u201383 (2002)","DOI":"10.1145\/780506.780516"},{"issue":"1\u20133","key":"295_CR30","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/S0022-4049(99)00005-5","volume":"139","author":"J-C Faug\u00e8re","year":"1999","unstructured":"Faug\u00e8re, J.-C.: A new efficient algorithm for computing Gr\u00f6bner bases (F4). J. Pure Appl. Algebr. 139(1\u20133), 61\u201388 (1999)","journal-title":"J. Pure Appl. Algebr."},{"key":"295_CR31","doi-asserted-by":"crossref","unstructured":"Fouque, P.A., Vannet, T.: Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks. FSE2013","DOI":"10.1007\/978-3-662-43933-3_26"},{"issue":"1","key":"295_CR32","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1504\/IJWMC.2007.013798","volume":"2","author":"M Hell","year":"2007","unstructured":"Hell, M., Johansson, T., Meier, W.: Grain: a stream cipher for constrained environments. Int. J. Wire. Mob. Comput. 2(1), 86\u201393 (2007)","journal-title":"Int. J. Wire. Mob. Comput."},{"key":"295_CR33","unstructured":"Hodges, Ti., Christophe P., Jacob S.: Degree of regularity for systems arising from weil descent. In: YAC2012\u2014Yet Another Conference in Cryptography, vol. 9 (2012)"},{"key":"295_CR34","doi-asserted-by":"crossref","unstructured":"Isobe, T., Sasaki, Y., Chen, J.: Related-key boomerang attacks on KATAN32\/48\/64. In: Colin, B., Leonie, S (eds.) ACISP 13, vol. 7959 of LNCS, pp. 268\u2013285. Brisbane, Australia, July 1\u20133. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-39059-3_19"},{"key":"295_CR35","doi-asserted-by":"crossref","unstructured":"Knellwolf, S., Meier, W., Naya-Plasencia, M.: Conditional differential cryptanalysis of Trivium and KATAN. In: Ali, M., Serge, V. (eds.) SAC 2011, vol. 7118 of LNCS, pp. 200\u2013212. Toronto, Ontario, Canada, August 11\u201312. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-28496-0_12"},{"key":"295_CR36","doi-asserted-by":"crossref","unstructured":"Knudsen, L.-R.: Truncated and higher order differentials. In: Bart, P. (eds.) FSE\u201994, vol. 1008 of LNCS, pp. 196\u2013211, Leuven, Belgium, December 14\u201316. Springer, Berlin (1994)","DOI":"10.1007\/3-540-60590-8_16"},{"key":"295_CR37","doi-asserted-by":"crossref","unstructured":"Lim, C.-W., Khoo, K.: An analysis of XSL applied to BES. In: Alex, B. (ed.) FSE\u00a02007, vol. 4593 of LNCS, pp. 242\u2013253, Luxembourg, Luxembourg, March 26\u201328. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-74619-5_16"},{"key":"295_CR38","doi-asserted-by":"crossref","unstructured":"Lipton, R.-J., Viglas, A.: On the complexity of SAT. In: 40th FOCS, pp. 459\u2013464, New York, New York, USA, October 17\u201319. IEEE Computer Society Press (1999)","DOI":"10.1109\/SFFCS.1999.814618"},{"key":"295_CR39","doi-asserted-by":"crossref","unstructured":"Mohamed, M.S.-E., Cabarcas, D., Ding, J., Buchmann, J., Bulygin, S.: MXL3: an efficient algorithm for computing Gr\u00f6bner bases of zero-dimensional ideals. In: Donghoon, L., Seokhie, H. (eds.) ICISC 09, vol. 5984 of LNCS, pp. 87\u2013100. Seoul, Korea, December\u00a02\u20134. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-14423-3_7"},{"key":"295_CR40","doi-asserted-by":"crossref","unstructured":"Mohamed, M.-S., Mohamed, W.-S., Ding, J., Buchmann, J.: MXL2: solving polynomial equations over GF(2) using an improved mutant strategy. In: Proceedings of the 2nd International Workshop on Post-Quantum Cryptography, PQCrypto \u201908, pp. 203\u2013215, Springer, Berlin, Heidelberg (2008)","DOI":"10.1007\/978-3-540-88403-3_14"},{"key":"295_CR41","first-page":"151","volume":"2012","author":"A Rostovtsev","year":"2012","unstructured":"Rostovtsev, A., Mizyukin, A.: On boolean ideals and varieties with application to algebraic attacks. IACR Cryptol. ePrint Arch. 2012, 151 (2012). informal publication","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"295_CR42","doi-asserted-by":"crossref","unstructured":"Song, L., Hu, L.: Improved algebraic and differential fault attacks on the katan block cipher. In: Robert, H.D., Tao, F. (eds.) Information Security Practice and Experience, vol. 7863 of Lecture Notes in Computer Science, pp. 372\u2013386. Springer, Berlin Heidelberg (2013)","DOI":"10.1007\/978-3-642-38033-4_27"},{"key":"295_CR43","unstructured":"Soos, M.: Cryptominisat 2.5.0. In: SAT Race Competitive Event Booklet (2010)"},{"key":"295_CR44","unstructured":"Stegers, T.: Faug\u00e8re\u2019s F5 algorithm revisited. Cryptol. ePrint Arch. Rep. 2006\/404, (2006). http:\/\/eprint.iacr.org\/"},{"key":"295_CR45","doi-asserted-by":"crossref","unstructured":"Wu, W., Zhang, L.: LBlock: a lightweight block cipher. In: Javier, L., Gene, T. (eds.) ACNS 11, vol. 6715 of LNCS, pp. 327\u2013344, Nerja, Spain, June 7\u201310. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-21554-4_19"},{"key":"295_CR46","doi-asserted-by":"crossref","unstructured":"Yang, B.-Y., Chen, J.-M., Courtois, N.: On asymptotic security estimates in XL and Gr\u00f6bner bases-related algebraic cryptanalysis. In: Javier, L., Sihan, Q., Eiji, O. (eds.) ICICS 04, vol. 3269 of LNCS, pp. 401\u2013413, Malaga, Spain, October 27\u201329. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-30191-2_31"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0295-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-015-0295-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0295-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T23:05:50Z","timestamp":1566947150000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-015-0295-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,9]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,2]]}},"alternative-id":["295"],"URL":"https:\/\/doi.org\/10.1007\/s10207-015-0295-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,9]]}}}