Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
From MaRDI portal
Publication:3391559
DOI10.1007/978-3-642-03317-9_1zbMath1291.94051OpenAlexW2164455525MaRDI QIDQ3391559
Itai Dinur, Adi Shamir, Jean-Philippe Aumasson, Willi Meier
Publication date: 11 August 2009
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-03317-9_1
Related Items (27)
Conditional Differential Cryptanalysis of Trivium and KATAN ⋮ High order differential attacks on stream ciphers ⋮ Applying cube attacks to stream ciphers in realistic scenarios ⋮ Quark: a lightweight hash ⋮ Correlation cube attacks: from weak-key distinguisher to key recovery ⋮ Cube Attack on Stream Ciphers using a Modified Linearity Test ⋮ Higher order differentiation over finite fields with applications to generalising the cube attack ⋮ Some cryptanalytic results on TRIAD ⋮ Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression ⋮ Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks ⋮ A novel method for driven stability of NFSRs via STP ⋮ Cryptanalysis of reduced round SPEEDY ⋮ Some results on lightweight stream ciphers Fountain v1 \& lizard ⋮ Optimising Gröbner bases on Bivium ⋮ A practical key-recovery attack on 805-round Trivium ⋮ Full round zero-sum distinguishers on \textsf{TinyJAMBU}-128 and \textsf{TinyJAMBU}-192 keyed-permutation in the known-key setting ⋮ Counting Boolean functions with faster points ⋮ Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression ⋮ Breaking Grain-128 with Dynamic Cube Attacks ⋮ Observing biases in the state: case studies with Trivium and Trivia-SC ⋮ Conditional cube attack on round-reduced River Keyak ⋮ Conditional Cube Attack on Reduced-Round Keccak Sponge Function ⋮ Quantum Algorithms Related to $$\textit{HN}$$ -Transforms of Boolean Functions ⋮ Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC ⋮ New cube distinguishers on NFSR-based stream ciphers ⋮ Cube Attacks on Tweakable Black Box Polynomials ⋮ Another View of the Division Property
This page was built for publication: Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium