Borrow it
 Architecture Library
 Bizzell Memorial Library
 Boorstin Collection
 Chinese Literature Translation Archive
 Engineering Library
 Fine Arts Library
 Harry W. Bass Business History Collection
 History of Science Collections
 John and Mary Nichols Rare Books and Special Collections
 Library Service Center
 Price College Digital Library
 Western History Collections
The Resource Algebraic Cryptanalysis, by Gregory Bard, (electronic resource)
Algebraic Cryptanalysis, by Gregory Bard, (electronic resource)
Resource Information
The item Algebraic Cryptanalysis, by Gregory Bard, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Oklahoma Libraries.This item is available to borrow from all library branches.
Resource Information
The item Algebraic Cryptanalysis, by Gregory Bard, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Oklahoma Libraries.
This item is available to borrow from all library branches.
 Summary
 Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided into three parts: Part One covers the process of turning a cipher into a system of equations; Part Two covers finite field linear algebra; Part Three covers the solution of Polynomial Systems of Equations, with a survey of the methods used in practice, including SATsolvers and the methods of Nicolas Courtois. The cipher Keeloq, used in nearly all automobiles with remote keyless entry, is described as a running example, including the manipulation of the equations to enable their solution. The stream cipher Trivium, along with its variants BiviumA and BiviumB, and the stream cipher family QUAD are also analyzed as extensive examples, including summaries of several published attacks. Additional topics include: Analytic Combinatorics, and its application to cryptanalysis The equicomplexity of linear algebra operations Graph coloring Factoring integers via the quadratic sieve, with its applications to the cryptanalysis of RSA Algebraic Cryptanalysis is designed for advancedlevel students in computer science and mathematics as a secondary text or reference book for selfguided study. This book is particularly suitable for researchers in Applied Abstract Algebra or Algebraic Geometry who wish to find more applied topics, practitioners working for security and communications companies, or intelligence agencies
 Language

 eng
 eng
 Edition
 1st ed. 2009.
 Extent
 1 online resource (371 p.)
 Note
 Description based upon print version of record
 Contents

 Introduction: How to Use this Book
 Cryptanalysis
 The Block Cipher Keeloq and Algebraic Attacks
 The FixedPoint Attack
 Iterated Permutations
 Stream Ciphers
 Linear Systems Mod 2
 Some Basic Facts about Linear Algebra over (2)
 The Complexity of (2)Matrix Operations
 On the Exponent of Certain Matrix Operations
 The Method of Four Russians
 The Quadratic Sieve
 Polynomial Systems and Satisfiability
 Strategies for Polynomial Systems
 Algorithms for Solving Polynomial Systems
 Converting MQ to CNFSAT
 How do SATSolvers Operate?
 Applying SATSolvers to Extension Fields of Low Degree
 Isbn
 9780387887579
 Label
 Algebraic Cryptanalysis
 Title
 Algebraic Cryptanalysis
 Statement of responsibility
 by Gregory Bard
 Subject

 Data structures (Computer scienc
 Field theory (Physics)
 Algebraic Geometry
 Geometry, algebraic
 Systems and Data Security
 Data Structures and Information Theory
 Linear and Multilinear Algebras, Matrix Theory
 Computer security
 Field Theory and Polynomials
 Cryptology
 Data encryption (Computer science)
 Matrix theory
 Language

 eng
 eng
 Summary
 Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided into three parts: Part One covers the process of turning a cipher into a system of equations; Part Two covers finite field linear algebra; Part Three covers the solution of Polynomial Systems of Equations, with a survey of the methods used in practice, including SATsolvers and the methods of Nicolas Courtois. The cipher Keeloq, used in nearly all automobiles with remote keyless entry, is described as a running example, including the manipulation of the equations to enable their solution. The stream cipher Trivium, along with its variants BiviumA and BiviumB, and the stream cipher family QUAD are also analyzed as extensive examples, including summaries of several published attacks. Additional topics include: Analytic Combinatorics, and its application to cryptanalysis The equicomplexity of linear algebra operations Graph coloring Factoring integers via the quadratic sieve, with its applications to the cryptanalysis of RSA Algebraic Cryptanalysis is designed for advancedlevel students in computer science and mathematics as a secondary text or reference book for selfguided study. This book is particularly suitable for researchers in Applied Abstract Algebra or Algebraic Geometry who wish to find more applied topics, practitioners working for security and communications companies, or intelligence agencies
 http://library.link/vocab/creatorName
 Bard, Gregory
 Dewey number
 004
 http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsaut
 S72XwsYdk3Q
 Language note
 English
 LC call number
 QA76.9.D35
 Literary form
 non fiction
 Nature of contents
 dictionaries
 http://library.link/vocab/subjectName

 Data structures (Computer scienc
 Field theory (Physics)
 Matrix theory
 Data encryption (Computer science)
 Geometry, algebraic
 Computer security
 Data Structures and Information Theory
 Field Theory and Polynomials
 Linear and Multilinear Algebras, Matrix Theory
 Cryptology
 Algebraic Geometry
 Systems and Data Security
 Label
 Algebraic Cryptanalysis, by Gregory Bard, (electronic resource)
 Note
 Description based upon print version of record
 Bibliography note
 Includes bibliographical references (p. 339350) and index
 Carrier category
 online resource
 Carrier category code
 cr
 Content category
 text
 Content type code
 txt
 Contents
 Introduction: How to Use this Book  Cryptanalysis  The Block Cipher Keeloq and Algebraic Attacks  The FixedPoint Attack  Iterated Permutations  Stream Ciphers  Linear Systems Mod 2  Some Basic Facts about Linear Algebra over (2)  The Complexity of (2)Matrix Operations  On the Exponent of Certain Matrix Operations  The Method of Four Russians  The Quadratic Sieve  Polynomial Systems and Satisfiability  Strategies for Polynomial Systems  Algorithms for Solving Polynomial Systems  Converting MQ to CNFSAT  How do SATSolvers Operate?  Applying SATSolvers to Extension Fields of Low Degree
 Dimensions
 unknown
 Edition
 1st ed. 2009.
 Extent
 1 online resource (371 p.)
 Form of item
 online
 Isbn
 9780387887579
 Media category
 computer
 Media type code
 c
 Other control number
 10.1007/9780387887579
 Specific material designation
 remote
 System control number

 (CKB)2670000000369196
 (EBL)478151
 (OCoLC)431401829
 (SSID)ssj0000316134
 (PQKBManifestationID)11261602
 (PQKBTitleCode)TC0000316134
 (PQKBWorkID)10281717
 (PQKB)10683520
 (DEHe213)9780387887579
 (MiAaPQ)EBC478151
 (EXLCZ)992670000000369196
 Label
 Algebraic Cryptanalysis, by Gregory Bard, (electronic resource)
 Note
 Description based upon print version of record
 Bibliography note
 Includes bibliographical references (p. 339350) and index
 Carrier category
 online resource
 Carrier category code
 cr
 Content category
 text
 Content type code
 txt
 Contents
 Introduction: How to Use this Book  Cryptanalysis  The Block Cipher Keeloq and Algebraic Attacks  The FixedPoint Attack  Iterated Permutations  Stream Ciphers  Linear Systems Mod 2  Some Basic Facts about Linear Algebra over (2)  The Complexity of (2)Matrix Operations  On the Exponent of Certain Matrix Operations  The Method of Four Russians  The Quadratic Sieve  Polynomial Systems and Satisfiability  Strategies for Polynomial Systems  Algorithms for Solving Polynomial Systems  Converting MQ to CNFSAT  How do SATSolvers Operate?  Applying SATSolvers to Extension Fields of Low Degree
 Dimensions
 unknown
 Edition
 1st ed. 2009.
 Extent
 1 online resource (371 p.)
 Form of item
 online
 Isbn
 9780387887579
 Media category
 computer
 Media type code
 c
 Other control number
 10.1007/9780387887579
 Specific material designation
 remote
 System control number

 (CKB)2670000000369196
 (EBL)478151
 (OCoLC)431401829
 (SSID)ssj0000316134
 (PQKBManifestationID)11261602
 (PQKBTitleCode)TC0000316134
 (PQKBWorkID)10281717
 (PQKB)10683520
 (DEHe213)9780387887579
 (MiAaPQ)EBC478151
 (EXLCZ)992670000000369196
Subject
 Algebraic Geometry
 Computer security
 Cryptology
 Data Structures and Information Theory
 Data encryption (Computer science)
 Data structures (Computer scienc
 Field Theory and Polynomials
 Field theory (Physics)
 Geometry, algebraic
 Linear and Multilinear Algebras, Matrix Theory
 Matrix theory
 Systems and Data Security
Library Locations

Architecture LibraryBorrow itGould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US35.205706 97.445050



Chinese Literature Translation ArchiveBorrow it401 W. Brooks St., RM 414, Norman, OK, 73019, US35.207487 97.447906

Engineering LibraryBorrow itFelgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US35.205706 97.445050

Fine Arts LibraryBorrow itCatlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US35.210371 97.448244

Harry W. Bass Business History CollectionBorrow it401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US35.207487 97.447906

History of Science CollectionsBorrow it401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US35.207487 97.447906

John and Mary Nichols Rare Books and Special CollectionsBorrow it401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US35.207487 97.447906


Price College Digital LibraryBorrow itAdams Hall 102 307 West Brooks St., Norman, OK, 73019, US35.210371 97.448244

Western History CollectionsBorrow itMonnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US35.209584 97.445414
Embed (Experimental)
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.libraries.ou.edu/portal/AlgebraicCryptanalysisbyGregoryBard/R5Zqf5j9VWw/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.libraries.ou.edu/portal/AlgebraicCryptanalysisbyGregoryBard/R5Zqf5j9VWw/">Algebraic Cryptanalysis, by Gregory Bard, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.libraries.ou.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.libraries.ou.edu/">University of Oklahoma Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data  Experimental
Data Citation of the Item Algebraic Cryptanalysis, by Gregory Bard, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.libraries.ou.edu/portal/AlgebraicCryptanalysisbyGregoryBard/R5Zqf5j9VWw/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.libraries.ou.edu/portal/AlgebraicCryptanalysisbyGregoryBard/R5Zqf5j9VWw/">Algebraic Cryptanalysis, by Gregory Bard, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.libraries.ou.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.libraries.ou.edu/">University of Oklahoma Libraries</a></span></span></span></span></div>