Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium

From MaRDI portal
Publication:3391559

DOI10.1007/978-3-642-03317-9_1zbMath1291.94051OpenAlexW2164455525MaRDI QIDQ3391559

Itai Dinur, Adi Shamir, Jean-Philippe Aumasson, Willi Meier

Publication date: 11 August 2009

Published in: Fast Software Encryption (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-03317-9_1




Related Items (27)

Conditional Differential Cryptanalysis of Trivium and KATANHigh order differential attacks on stream ciphersApplying cube attacks to stream ciphers in realistic scenariosQuark: a lightweight hashCorrelation cube attacks: from weak-key distinguisher to key recoveryCube Attack on Stream Ciphers using a Modified Linearity TestHigher order differentiation over finite fields with applications to generalising the cube attackSome cryptanalytic results on TRIADStream ciphers: a practical solution for efficient homomorphic-ciphertext compressionImproving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube AttacksA novel method for driven stability of NFSRs via STPCryptanalysis of reduced round SPEEDYSome results on lightweight stream ciphers Fountain v1 \& lizardOptimising Gröbner bases on BiviumA practical key-recovery attack on 805-round TriviumFull round zero-sum distinguishers on \textsf{TinyJAMBU}-128 and \textsf{TinyJAMBU}-192 keyed-permutation in the known-key settingCounting Boolean functions with faster pointsStream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext CompressionBreaking Grain-128 with Dynamic Cube AttacksObserving biases in the state: case studies with Trivium and Trivia-SCConditional cube attack on round-reduced River KeyakConditional Cube Attack on Reduced-Round Keccak Sponge FunctionQuantum Algorithms Related to $$\textit{HN}$$ -Transforms of Boolean FunctionsImproved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MACNew cube distinguishers on NFSR-based stream ciphersCube Attacks on Tweakable Black Box PolynomialsAnother View of the Division Property




This page was built for publication: Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium