Correlation cube attacks: from weak-key distinguisher to key recovery
From MaRDI portal
Publication:1648859
DOI10.1007/978-3-319-78375-8_23zbMath1428.94086OpenAlexW2795211299MaRDI QIDQ1648859
Jingchun Yang, Wenhao Wang, Meicheng Liu, Dong-Dai Lin
Publication date: 9 July 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-78375-8_23
Related Items (7)
Improving Division Property Based Cube Attacks by Removing Invalid Monomials ⋮ Improved division property for ciphers with complex linear layers ⋮ An experimentally verified attack on 820-round Trivium ⋮ A practical key-recovery attack on 805-round Trivium ⋮ The MILP-aided conditional differential attack and its application to Trivium ⋮ An improved degree evaluation method of NFSR-based cryptosystems ⋮ New cube distinguishers on NFSR-based stream ciphers
Cites Work
- Advances in cryptology -- EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26--30, 2015. Proceedings. Part II
- Fast correlation attacks on certain stream ciphers
- Degree evaluation of NFSR-based cryptosystems
- Cube attacks on non-blackbox polynomials based on division property
- TriviA: a fast and secure authenticated encryption scheme
- Conditional Differential Cryptanalysis of Trivium and KATAN
- Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks
- Structural Evaluation by Generalized Integral Property
- Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
- Breaking Grain-128 with Dynamic Cube Attacks
- Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems
- Greedy Distinguishers and Nonrandomness Detectors
- An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
- Trivium
- Cube Attacks on Tweakable Black Box Polynomials
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
- Bit-Based Division Property and Application to Simon Family
- Higher Order Derivatives and Differential Cryptanalysis
- Keccak
- Two Trivial Attacks on Trivium
- A Framework for Chosen IV Statistical Analysis of Stream Ciphers
- Conditional Cube Attack on Reduced-Round Keccak Sponge Function
This page was built for publication: Correlation cube attacks: from weak-key distinguisher to key recovery