How to cite PolyBoRi
We ask you to cite PolyBoRi for each scientific publication, that uses
PolyBoRi.
This helps us to receive funding for further development.
Please use the following bibtex entry to cite PolyBoRi:
@article{Brickenstein20091326,
title =
"PolyBoRi: A framework for Gröbner-basis computations with Boolean polynomials",
journal = "Journal of Symbolic Computation",
volume = "44",
number = "9",
pages = "1326 - 1345",
year = "2009",
note = "Effective Methods in Algebraic Geometry",
issn = "0747-7171",
doi = "DOI: 10.1016/j.jsc.2008.02.017",
url = "http://dx.doi.org/10.1016/j.jsc.2008.02.017",
author = "Michael Brickenstein and Alexander Dreyer",
keywords = "Boolean Gröbner basis",
keywords = "Formal verification",
keywords = "Algebraic cryptoanalysis",
keywords = "Satisfiability"
}
Please, also cite our used subsystems:
How to cite CUDD
@misc{ somenzi98cudd,
author = "F. Somenzi",
title = "CUDD: CU Decision Diagram Package Release",
text = "F. Somenzi. CUDD: CU Decision Diagram Package Release 2.3.0. University
of Colorado at Boulder, 1998.",
year = "1998",
OPTurl = "citeseer.ist.psu.edu/somenzi98cudd.html" }
How to cite M4RI
@manual{M4RI,
key = "M4RI",
author = "Martin Albrecht and Gregory Bard"
organization = "The M4RI~Team",
title = "{The M4RI Library -- Version 20090409}",
year = 2009,
url = "\url{http://m4ri.sagemath.org}",
}
Articles citing PolyBoRi
-
Brickenstein, Michael; Dreyer, AlexanderPolybori: A framework for Gröbner-basis computations with Boolean polynomials
J. Symb. Comput. 44, No. 9, 1326-1345 (2009).
-
Albrecht, Martin; Cid, CarlosAlgebraic techniques in differential cryptanalysis
-
Kreuzer, MartinAlgebraic attacks Galore!
-
Eröcal, Burcin; Stein, WilliamThe sage project: Unifying free mathematical software to create a viable alternative to Magma, Maple, Mathematica and MATLAB
-
Brickenstein, MichaelSlimgb: Gröbner bases with slim polynomials
Rev. Mat. Complut. 23, No. 2, 453-466 (2010).
-
Brickenstein, MichaelBoolean Gröbner bases. Theory, algorithms and applications
Berlin: Logos Verlag; Kaiserslautern: TU Kaiserslautern, Fachbereich Mathematik (Diss. 2010) (ISBN 978-3-8325-2597-2/pbk). x, 149~p. (2010).
-
Chai, Fengjuan; Gao, Xiao-Shan; Yuan, ChunmingA characteristic set method for solving Boolean equations and applications in cryptanalysis of stream ciphers
J. Syst. Sci. Complex. 21, No. 2, 191-208 (2008).
-
Eibach, Tobias; Völkel, Gunnar; Pilz, EnricoOptimising Gröbner bases on Bivium
Math. Comput. Sci. 3, No. 2, 159-172 (2010).
-
Bulygin, Stanislav; Brickenstein, MichaelObtaining and solving systems of equations in key variables only for the small variants of AES
Math. Comput. Sci. 3, No. 2, 185-200 (2010).
-
Sato, Yosuke; Inoue, Shutaro; Suzuki, Akira; Nabeshima, Katsusuke; Sakai, KoBoolean Gröbner bases
J. Symb. Comput. 46, No. 5, 622-632 (2011).
-
Albrecht, Martin; Cid, Carlos; Dullien, Thomas; Faugère, Jean-Charles; Perret, Ludovic
Algebraic precomputations in differential and integral cryptanalysis.
Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20–24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 387-403 (2011).