algebraic attack

алгебраическая атака (ведется с привлечением алгебраической теории)

English-Russian cryptological dictionary . 2014.

Смотреть что такое "algebraic attack" в других словарях:

  • XSL attack — In cryptography, the XSL attack is a method of cryptanalysis for block ciphers. The attack was first published in 2002 by researchers Nicolas Courtois and Josef Pieprzyk. It has caused some controversy as it was claimed to have the potential to… …   Wikipedia

  • Cube attack — Cryptography portal The cube attack is a method of cryptanalysis applicable to a wide variety of symmetric key algorithms, published by Itai Dinur and Adi Shamir in a September 2008 preprint. A revised version of this preprint was placed online… …   Wikipedia

  • Correlation attack — In cryptography, correlation attacks are a class of known plaintext attacks for breaking stream ciphers whose keystream is generated by combining the output of several linear feedback shift registers (called LFSRs for the rest of this article)… …   Wikipedia

  • Interpolation attack — In cryptography, an interpolation attack is a type of cryptanalytic attack against block ciphers.In the attack, an algebraic function is used to represent an S box. This may be a simple quadratic, or a polynomial or rational function over a… …   Wikipedia

  • Coppersmith's Attack — describes a class of attacks on the public key cryptosystem RSA based on Coppersmith s theorem (see below). The public key in the RSA system is a tuple of integers (N,e), where N is the product of two primes p and q. The secret key is given by an …   Wikipedia

  • Standard Algebraic Notation — Portable Game Notation Pour les articles homonymes, voir PGN. Portable Game Notation (PGN) désigne un standard de codage des parties d échecs. Il est principalement utilisé pour la retransmission des parties sur internet et dans les bases de… …   Wikipédia en Français

  • Torre Attack — Chess diagram|= tright| = 8 |rd|nd|bd|qd|kd|bd| |rd|= 7 |pd|pd|pd|pd| |pd|pd|pd|= 6 | | | | |pd|nd| | |= 5 | | | | | | |bl| |= 4 | | | |pl| | | | |= 3 | | | | | |nl| | |= 2 |pl|pl|pl| |pl|pl|pl|pl|= 1 |rl|nl| |ql|kl|bl| |rl|= a b c d e f g h|The… …   Wikipedia

  • Summation generator — The summation generator, created in 1985, by Rainer Rueppel, was a cryptography and security front runner in the late 1980s. It operates by taking the output of two LFSR s through an adder with carry. The operation s strength is that it is… …   Wikipedia

  • Multilinear algebra — In mathematics, multilinear algebra extends the methods of linear algebra. Just as linear algebra is built on the concept of a vector and develops the theory of vector spaces, multilinear algebra builds on the concepts of p vectors and… …   Wikipedia

  • List of cryptographers — See also: Category:Cryptographers for an exhaustive list. Contents 1 Pre twentieth century 2 World War I and World War II Wartime Cryptographers 3 Other pre computer 4 Modern …   Wikipedia

  • Camellia (cipher) — Infobox block cipher name = Camellia caption = designers = Mitsubishi, NTT publish date = 2000 derived from = E2, MISTY1 derived to = related to = certification = CRYPTREC, NESSIE key size = 128, 192 or 256 bits block size = 128 bits structure =… …   Wikipedia


Другие книги по запросу «algebraic attack» >>

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.