Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems Advances in Cryptology -CRYPTO '96. Volume 1109 of Lecture Notes in Computer Science, pp.104-113, 1996. ,
Differential Power Analysis, Lecture Notes in Computer Science, vol.1666, pp.388-397, 1999. ,
DOI : 10.1007/3-540-48405-1_25
Lest we remember, USENIX Security Symposium, USENIX Association, pp.45-60, 2008. ,
DOI : 10.1145/1506409.1506429
Reconstructing RSA Private Keys from Random Key Bits, Proceedings of Crypto 2009, pp.1-17, 2009. ,
DOI : 10.1007/978-3-642-03356-8_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.6281
Low temperature data remanence in static RAM, 2002. ,
An Improved Recovery Algorithm for Decayed AES Key Schedule Images, Lecture Notes in Computer Science, vol.5867, pp.215-230, 2009. ,
DOI : 10.1007/978-3-642-05445-7_14
Cold Boot Key Recovery by Solving Polynomial Systems with Noise, Lecture Notes in Computer Science, vol.6715, pp.57-72, 2011. ,
DOI : 10.1007/978-3-642-05445-7_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.224.486
PolyBoRi: A framework for Gr??bner-basis computations with Boolean polynomials, Journal of Symbolic Computation, vol.44, issue.9, pp.1326-1345, 2009. ,
DOI : 10.1016/j.jsc.2008.02.017
Playing ???Hide and Seek??? with Stored Keys, pp.118-124, 1999. ,
DOI : 10.1007/3-540-48390-X_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.4467
The persistence of memory: Forensic identification and extraction of cryptographic keys, Digital Investigation, pp.132-140, 2009. ,
DOI : 10.1016/j.diin.2009.06.002
Extracting Disk Encryption Keys From Volatile Memory, 2007. ,
Algebraic and Slide Attacks on KeeLoq, Lecture Notes in Computer Science, vol.5086, pp.97-115, 2008. ,
DOI : 10.1007/978-3-540-71039-4_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.2872
Algebraic Cryptanalysis of the Data Encryption Standard, Cryptography and Coding, pp.152-169, 2007. ,
DOI : 10.1007/978-3-540-77272-9_10
Algebraic Cryptanalysis of SMS4: Gr??bner Basis Attack and SAT Attack Compared, Lecture Notes in Computer Science, vol.5984, pp.73-86, 2009. ,
DOI : 10.1007/978-3-642-14423-3_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.296.7408
In: Gröbner-Bases: An Algorithmic Method in Polynomial Ideal Theory, pp.184-232, 1985. ,
Block Ciphers Sensitive to Gr??bner Basis Attacks, Lecture Notes in Computer Science, vol.3860, pp.313-331, 2006. ,
DOI : 10.1007/11605805_20
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.4015
Attacking Bivium Using SAT Solvers, Proceedings of the 11th international conference on Theory and applications of satisfiability testing. SAT'08, pp.63-76, 2008. ,
DOI : 10.1007/978-3-540-79719-7_7
Practical Algebraic Attacks on the Hitag2 Stream Cipher, Lecture Notes in Computer Science, vol.24, pp.167-176, 2009. ,
DOI : 10.1007/3-540-39466-4_17
Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards, Cryptology ePrint Archive Report, vol.166, 2008. ,
Algebraic cryptanalysis of a small-scale version of stream cipher Lex, IET Information Security, vol.4, issue.2, pp.49-61, 2010. ,
DOI : 10.1049/iet-ifs.2009.0118
Applications of SAT Solvers to Cryptanalysis of Hash Functions, Lecture Notes in Computer Science, vol.4121, pp.102-115, 2006. ,
DOI : 10.1007/11814948_13
Inversion Attacks on Secure Hash Functions Using sat Solvers, Lecture Notes in Computer Science, vol.4501, pp.377-382, 2007. ,
DOI : 10.1007/978-3-540-72788-0_36
Algebraic Cryptanalysis of 58-Round SHA-1, Lecture Notes in Computer Science, vol.4593, pp.349-365, 2007. ,
DOI : 10.1007/978-3-540-74619-5_22
URL : https://hal.archives-ouvertes.fr/hal-01336553
Finding Collisions in the Full SHA-1, Lecture Notes in Computer Science, vol.3621, pp.17-36, 2005. ,
DOI : 10.1007/11535218_2
Algebraic Attacks from a Groebner Basis Perspective, 2004. ,
The complexity of theorem-proving procedures, Proceedings of the third annual ACM symposium on Theory of computing , STOC '71, pp.151-158, 1971. ,
DOI : 10.1145/800157.805047
The Design of Rijndael: AES -The Advanced Encryption Standard, 2002. ,
DOI : 10.1007/978-3-662-04722-4
Serpent: A Proposal for the Advanced Encryption Standard, 2012. ,
Applications of SAT Solvers to AES Key Recovery from Decayed Key Schedule Images, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies, pp.216-220, 2010. ,
DOI : 10.1109/SECURWARE.2010.42