Conditional Cube Attack on Reduced-Round Keccak Sponge Function
From MaRDI portal
Publication:5738977
DOI10.1007/978-3-319-56614-6_9zbMath1415.94439OpenAlexW2613741682MaRDI QIDQ5738977
Meiqin Wang, Senyang Huang, Xiaoyun Wang, Guangwu Xu, Jingyuan Zhao
Publication date: 13 June 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-56614-6_9
Related Items (10)
Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystems ⋮ Cryptanalysis of full LowMC and LowMC-M with algebraic techniques ⋮ New Results on the SymSum Distinguisher on Round-Reduced SHA3 ⋮ Correlation cube attacks: from weak-key distinguisher to key recovery ⋮ MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes ⋮ Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ Conditional Cube Searching and Applications on Trivium-Variant Ciphers ⋮ A practical key-recovery attack on 805-round Trivium ⋮ Conditional cube attack on round-reduced River Keyak ⋮ Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC
Uses Software
Cites Work
- Improved practical attacks on round-reduced Keccak
- Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis
- Cryptanalysis of Ascon
- Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- $$f$$ f Permutation
- Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
- Breaking Grain-128 with Dynamic Cube Attacks
- Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems
- Practical Analysis of Reduced-Round Keccak
- Differential Power Analysis of MAC-Keccak at Any Key-Length
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- Cube Attacks on Tweakable Black Box Polynomials
- Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques
- Higher Order Derivatives and Differential Cryptanalysis
- Unaligned Rebound Attack: Application to Keccak
- Differential Biases in Reduced-Round Keccak
- How to Break MD5 and Other Hash Functions
- SAGE
This page was built for publication: Conditional Cube Attack on Reduced-Round Keccak Sponge Function