Results 241 to 250 of about 53,319 (274)

The Cube Attack on Stream Cipher Trivium and Quadraticity Tests [PDF]

open access: possibleFundamenta Informaticae, 2012
In 2008 I. Dinur and A. Shamir presented a new type of algebraic attack on symmetric ciphers named cube attack. The method has been applied to reduced variants of stream ciphers Trivium and Grain-128, reduced variants of the block ciphers Serpent and CTC and to a reduced version of the keyed hash function MD6.
Mroczkowski, Piotr, Szmidt, Janusz
openaire   +2 more sources

Cryptanalysis on PHOTON hash function using cube attack

2012 International Conference on Information Security and Intelligent Control, 2012
The lightweight hash function PHOTON has shown excellent hardware compactness which almost reaches the theoretical optimum and brings benefits for on-tag applications. Unlike cryptanalysis which tries to find collisions or build distinguishers on PHOTON, we apply cube attack for secret recovery of PHOTON. We focus on 1 to 3 round of PHOTON-128/16/16 in
Chia-Yu Lu   +3 more
openaire   +1 more source

Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon

2020 IEEE 33rd International System-on-Chip Conference (SOCC), 2020
Ascon algorithm was selected in 2019, in the CAESAR competition as the first option for lightweight applications as an alternative to AES-GCM for authenticated encryption. As with other encryption algorithms, Ascon relies on some parameters and security assumptions to guarantee its security.
Jorge E. Duarte-Sanchez, Basel Halak
openaire   +1 more source

Conditional cube attack on round-reduced River Keyak

Designs, Codes and Cryptography, 2017
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Wenquan Bi   +4 more
openaire   +2 more sources

MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes

Designs, Codes and Cryptography, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Wenquan Bi   +4 more
openaire   +1 more source

Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search

Journal of Cryptographic Engineering, 2019
Dinur and Shamir's cube attack has attracted significant attention in the literature. Nevertheless, the lack of implementations achieving effective results casts doubts on its practical relevance. On the theoretical side, promising results have been recently achieved leveraging on division trails. The present paper follows a more practical approach and
Marco Cianfriglia   +4 more
openaire   +3 more sources

Applying cube attacks to stream ciphers in realistic scenarios

Cryptography and Communications, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dinur, Itai, Shamir, Adi
openaire   +2 more sources

Cube attack on stream cipher E0: revisited

International Journal of Information Technology, 2022
Kakumani K. C. Deepthi   +2 more
openaire   +1 more source

Cube and dynamic cube attacks on SIMON32/64

2014 11th International ISC Conference on Information Security and Cryptology, 2014
Reihaneh Rabbaninejad   +3 more
openaire   +1 more source

Cube Attack on Grain

Journal of Software, 2012
Hai-Xin SONG   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy