Conditional cube attack on round-reduced River Keyak
From MaRDI portal
Publication:1752548
DOI10.1007/s10623-017-0396-7zbMath1387.94068OpenAlexW2740223363MaRDI QIDQ1752548
Xiaoyang Dong, Zheng Li, Wenquan Bi, Xiaoyun Wang, Lu Li
Publication date: 24 May 2018
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-017-0396-7
Related Items (2)
MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes ⋮ Conditional Cube Searching and Applications on Trivium-Variant Ciphers
Uses Software
Cites Work
- Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks
- Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
- Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
- Breaking Grain-128 with Dynamic Cube Attacks
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- Cube Attacks on Tweakable Black Box Polynomials
- Differential Propagation Analysis of Keccak
- Keccak
- Differential Biases in Reduced-Round Keccak
- Conditional Cube Attack on Reduced-Round Keccak Sponge Function
This page was built for publication: Conditional cube attack on round-reduced River Keyak