Correlation cube attack revisited. Improved cube search and superpoly recovery techniques
From MaRDI portal
Publication:6595813
DOI10.1007/978-981-99-8727-6_7zbMATH Open1546.94108MaRDI QIDQ6595813
Lu Qin, Jianhua Wang, Baofeng Wu
Publication date: 30 August 2024
Cites Work
- Correlation cube attacks: from weak-key distinguisher to key recovery
- Improved division property based cube attacks exploiting algebraic properties of superpoly
- Degree evaluation of NFSR-based cryptosystems
- Cube attacks on non-blackbox polynomials based on division property
- A new framework for finding nonlinear superpolies in cube attacks against Trivium-like ciphers
- Modeling for three-subset division property without unknown subset
- Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD
- MILP-aided method of searching division property using three subsets and applications
- New cube distinguishers on NFSR-based stream ciphers
- An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums
- Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- Structural Evaluation by Generalized Integral Property
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
- Breaking Grain-128 with Dynamic Cube Attacks
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
- Cube Attacks on Tweakable Black Box Polynomials
- Serpent: A New Block Cipher Proposal
- Bit-Based Division Property and Application to Simon Family
- Keccak
- Conditional Cube Attack on Reduced-Round Keccak Sponge Function
- An experimentally verified attack on 820-round Trivium
- A practical key-recovery attack on 805-round Trivium
- Massive superpoly recovery with nested monomial predictions
- Stretching cube attacks: improved methods to recover massive superpolies
This page was built for publication: Correlation cube attack revisited. Improved cube search and superpoly recovery techniques
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6595813)