Code obfuscation against symbolic execution attacks

S Banescu, C Collberg, V Ganesh… - Proceedings of the …, 2016 - dl.acm.org
Code obfuscation is widely used by software developers to protect intellectual property, and
malware writers to hamper program analysis. However, there seems to be little work on …

[КНИГА][B] Algebraic cryptanalysis

G Bard - 2009 - books.google.com
Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able
to read the cryptanalytic literature. This book is divided into three parts: Part One covers the …

Machine learning attacks against the Asirra CAPTCHA

P Golle - Proceedings of the 15th ACM conference on Computer …, 2008 - dl.acm.org
The Asirra CAPTCHA [EDHS2007], proposed at ACM CCS 2007, relies on the problem of
distinguishing images of cats and dogs (a task that humans are very good at). The security of …

Algebraic cryptanalysis of the data encryption standard

NT Courtois, GV Bard - Cryptography and Coding: 11th IMA International …, 2007 - Springer
In spite of growing importance of the Advanced Encryption Standard (AES), the Data
Encryption Standard (DES) is by no means obsolete. DES has never been broken from the …

Opening the black box inside Grover's algorithm

EM Stoudenmire, X Waintal - Physical Review X, 2024 - APS
Grover's algorithm is one of the primary algorithms offered as evidence that quantum
computers can provide an advantage over classical computers. It involves an …

[PDF][PDF] Sha-3 proposal blake

JP Aumasson, L Henzen, W Meier… - Submission to …, 2008 - perso.uclouvain.be
In 1993, NIST published the first Secure Hash Standard SHA-0, which two years later was
superseded by SHA-1 to improve the original design. SHA-1 was still deemed secure by the …

Exponential recency weighted average branching heuristic for SAT solvers

J Liang, V Ganesh, P Poupart… - Proceedings of the AAAI …, 2016 - ojs.aaai.org
Modern conflict-driven clause-learning SAT solvers routinely solve large real-world
instances with millions of clauses and variables in them. Their success crucially depends on …

New records in collision attacks on SHA-2

Y Li, F Liu, G Wang - Annual International Conference on the Theory and …, 2024 - Springer
The SHA-2 family including SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224 and
SHA512/256 is a US federal standard published by NIST. Especially, there is no doubt that …

Efficient methods for conversion and solution of sparse systems of low-degree multivariate polynomials over GF (2) via SAT-solvers

GV Bard, NT Courtois, C Jefferson - Cryptology ePrint Archive, 2007 - eprint.iacr.org
The computational hardness of solving large systems of sparse and low-degree multivariate
equations is a necessary condition for the security of most modern symmetric cryptographic …

Algebraic and slide attacks on KeeLoq

NT Courtois, GV Bard, D Wagner - … 10-13, 2008, Revised Selected Papers …, 2008 - Springer
KeeLoq is a block cipher used in wireless devices that unlock the doors and alarms in cars
manufactured by Chrysler, Daewoo, Fiat, GM, Honda, Jaguar, Toyota, Volvo, Volkswagen …