Massive superpoly recovery with nested monomial predictions
From MaRDI portal
Publication:6157499
DOI10.1007/978-3-030-92062-3_14zbMath1514.94101OpenAlexW3203614282MaRDI QIDQ6157499
Kai Hu, Qingju Wang, Yosuke Todo, Siwei Sun, Meiqin Wang
Publication date: 12 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: http://orbilu.uni.lu/handle/10993/49480
Related Items (5)
Improved graph-based model for recovering superpoly on Trivium ⋮ Cryptanalysis of reduced round SPEEDY ⋮ An experimentally verified attack on 820-round Trivium ⋮ Stretching cube attacks: improved methods to recover massive superpolies ⋮ From unbalanced to perfect: implementation of low energy stream ciphers
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Improved division property based cube attacks exploiting algebraic properties of superpoly
- Degree evaluation of NFSR-based cryptosystems
- Cube attacks on non-blackbox polynomials based on division property
- A new framework for finding nonlinear superpolies in cube attacks against Trivium-like ciphers
- Linearly equivalent s-boxes and the division property
- Modeling for three-subset division property without unknown subset
- Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD
- MILP-aided method of searching division property using three subsets and applications
- Automatic search for a variant of division property using three subsets
- An AEAD variant of the Grain stream cipher
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums
- Lower bounds on the degree of block ciphers
- A $$2^{70}$$ Attack on the Full MISTY1
- Another View of the Division Property
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- Structural Evaluation by Generalized Integral Property
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
- Integral Cryptanalysis on Full MISTY1
- Trivium
- Cube Attacks on Tweakable Black Box Polynomials
- New block encryption algorithm MISTY
- The block cipher Square
- Bit-Based Division Property and Application to Simon Family
This page was built for publication: Massive superpoly recovery with nested monomial predictions