{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:04:30Z","timestamp":1750277070908},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1-3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1007\/s10623-010-9465-x","type":"journal-article","created":{"date-parts":[[2010,12,31]],"date-time":"2010-12-31T04:50:52Z","timestamp":1293771052000},"page":"349-364","source":"Crossref","is-referenced-by-count":3,"title":["Sparse Boolean equations and circuit lattices"],"prefix":"10.1007","volume":"59","author":[{"given":"Igor","family":"Semaev","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2011,1,1]]},"reference":[{"key":"9465_CR1","unstructured":"Bardet M., Faug\u00e9re J.-C., Salvy B.: Complexity of Gr\u00f6bner basis computation for semi-regular overdetermined sequences over F 2 with solutions in F 2, Research report RR\u20135049, INRIA (2003)."},{"key":"9465_CR2","unstructured":"Clayon R., Bond M.: Experience using a low-cost FPGA design to crack DES keys. In: CHES 2002, LNCS 2523, pp. 579\u2013592, Springer-Verlag (2002)."},{"key":"9465_CR3","unstructured":"Courtois N., Klimov A., Patarin J., Shamir A.: Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: Eurocrypt 2000, LNCS 1807, pp. 392\u2013407, Springer-Verlag (2000)."},{"key":"9465_CR4","unstructured":"Courtois N.T., Bard G.V.: Algebraic Cryptanalysis of the Data Encryption Standard, Cryptology ePrint Archive: Report 2006\/402."},{"key":"9465_CR5","unstructured":"Courtois N.T., Bard G.V., Wagner D.: Algebraic and Slide Attacks on KeeLoq, Cryptology ePrint Archive: Report 2007\/062."},{"issue":"6","key":"9465_CR6","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W. Diffie","year":"1977","unstructured":"Diffie W., Hellman M.: Exhaustive cryptanalysis of the NBS Data Encryption Standard. Computer 10(6), 74\u201384 (1977)","journal-title":"Computer"},{"key":"9465_CR7","unstructured":"Electronic Frontier Foundation: Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design, O\u2019Reilly and Assotiates Inc. (1998)."},{"key":"9465_CR8","unstructured":"Faug\u00e8re, J.-C.: A new efficient algorithm for computing Gr\u00f6bner bases without reduction to zero (F5), Proc. of ISSAC 2002, pp. 75\u201383, ACM Press (2002)."},{"key":"9465_CR9","unstructured":"http:\/\/www.intel.com ."},{"key":"9465_CR10","unstructured":"http:\/\/www.semiconductor.net\/article\/CA6514491.html ."},{"key":"9465_CR11","doi-asserted-by":"crossref","unstructured":"Geiselmann W., Matheis K., Steinwandt R.: PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware, Cryptology ePrint Archive, 2009\/222.","DOI":"10.1007\/978-3-642-17499-5_12"},{"key":"9465_CR12","first-page":"61","volume":"82","author":"K. Iwama","year":"2004","unstructured":"Iwama K.: Worst-case upper bounds for kSAT. The Bulletin of the EATCS 82, 61\u201371 (2004)","journal-title":"The Bulletin of the EATCS"},{"key":"9465_CR13","unstructured":"Kumar S., Paar C., Pelzl J., Pfeiffer G., Schimmler M.: Breaking ciphers with Copacobana-a cost-optimized parallel code breaker. In: CHES2006, LNCS 4249, pp. 101\u2013118, Springer-Verlag(2006)."},{"key":"9465_CR14","unstructured":"Osvik D.A., Tromer E.: Cryptologic applications of the Playstation3: Cell SPEED, http:\/\/www.hyperelliptic.org\/SPEED\/slides\/Osvik_cell-speed.pdf ."},{"key":"9465_CR15","unstructured":"Raddum H., Semaev I.: New technique for solving sparse equation systems, Cryptology ePrint Archive, 2006\/475."},{"key":"9465_CR16","unstructured":"Raddum H., Semaev I.: Solving Multiple Right Hand Sides linear equations, Designs, Codes and Cryptography, vol. 49, pp. 147\u2013160 (2008), extended abstract in Proceedings of WCC\u201907, 16-20 April 2007, Versailles, France, INRIA (2007)."},{"key":"9465_CR17","unstructured":"Rouvroy G., Standaert F.-X., Quisquater J.-J., Legat, J.-D.: Design strategies and modified desciptions to optimize cipher FPGA implementations: fast and compact results for DES and Triple-DES. In: FPL2003, LNCS 2778, pp. 181\u2013193, Springer-Verlag (2003)."},{"key":"9465_CR18","unstructured":"Semaev I.: On solving sparse algebraic equations over finite fields, Designs, Codes and Cryptography, vol. 49, pp. 47\u201360,(2008), extended abstract in Proceedings of WCC\u201907, 16-20 April 2007, Versailles, France, INRIA(2007)."},{"key":"9465_CR19","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1137\/070700371","volume":"39","author":"I. Semaev","year":"2009","unstructured":"Semaev I.: Sparse algebraic equations over finite fields. SIAM J. Comput. 39, 388\u2013409 (2009)","journal-title":"SIAM J. Comput."},{"key":"9465_CR20","unstructured":"Semaev I.: Improved Agreeing-Gluing algorithm. In: Proceedings of SCC\u201910, 23\u201325 June 2010, Royal Holloway, University of London, UK, pp. 73\u201388."},{"key":"9465_CR21","unstructured":"Yang B.-Y., Chen J-M., Courtois, N.: On asymptotic security estimates in XL and Gr\u00f6bner bases-related algebraic cryptanalysis. In: ICICS 2004, LNCS 3269, pp. 401\u2013413, Springer-Verlag (2004)."},{"key":"9465_CR22","unstructured":"Wiener M.J.: Efficient DES key search. In: Stalling, W.R. (ed.) Practical Cryptography for Data Interworks, pp.31\u201379. IEEE Computer Society Press (1996)."},{"key":"9465_CR23","unstructured":"Zakrevskij A., Vasilkova I.: Reducing large systems of Boolean equations. In: 4th Int. Workshop on Boolean Problems, Freiberg University, September, pp. 21\u201322 (2000)."},{"key":"9465_CR24","unstructured":"Zeitzoff P.: 2007 International Technology Roadmap: MOSFET scaling challenges, Solid State Technology Magazine, February (2008)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.springerlink.com\/index\/pdf\/10.1007\/s10623-010-9465-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T08:55:20Z","timestamp":1559897720000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-010-9465-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,1]]},"references-count":24,"journal-issue":{"issue":"1-3","published-print":{"date-parts":[[2011,4]]}},"alternative-id":["9465"],"URL":"https:\/\/doi.org\/10.1007\/s10623-010-9465-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1,1]]}}}