A practical key-recovery attack on 805-round Trivium
From MaRDI portal
Publication:6157491
DOI10.1007/978-3-030-92062-3_7zbMath1514.94142OpenAlexW3109585480MaRDI QIDQ6157491
No author found.
Publication date: 12 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-92062-3_7
Related Items
Improved graph-based model for recovering superpoly on Trivium ⋮ An experimentally verified attack on 820-round Trivium ⋮ Stretching cube attacks: improved methods to recover massive superpolies
Cites Work
- Unnamed Item
- Observing biases in the state: case studies with Trivium and Trivia-SC
- Correlation cube attacks: from weak-key distinguisher to key recovery
- Improved division property based cube attacks exploiting algebraic properties of superpoly
- Degree evaluation of NFSR-based cryptosystems
- Cube attacks on non-blackbox polynomials based on division property
- A new framework for finding nonlinear superpolies in cube attacks against Trivium-like ciphers
- Modeling for three-subset division property without unknown subset
- Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD
- MILP-aided method of searching division property using three subsets and applications
- New cube distinguishers on NFSR-based stream ciphers
- Improved conditional cube attacks on Keccak keyed modes with MILP method
- An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums
- Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
- Breaking Grain-128 with Dynamic Cube Attacks
- Greedy Distinguishers and Nonrandomness Detectors
- An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- Trivium
- Cube Attacks on Tweakable Black Box Polynomials
- Cube Attacks on Non-Blackbox Polynomials Based on Division Property
- Bit-Based Division Property and Application to Simon Family
- Algorithmic Cryptanalysis
- Conditional Cube Attack on Reduced-Round Keccak Sponge Function