Results 241 to 250 of about 53,319 (274)
The Cube Attack on Stream Cipher Trivium and Quadraticity Tests [PDF]
In 2008 I. Dinur and A. Shamir presented a new type of algebraic attack on symmetric ciphers named cube attack. The method has been applied to reduced variants of stream ciphers Trivium and Grain-128, reduced variants of the block ciphers Serpent and CTC and to a reduced version of the keyed hash function MD6.
Mroczkowski, Piotr, Szmidt, Janusz
openaire +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cryptanalysis on PHOTON hash function using cube attack
2012 International Conference on Information Security and Intelligent Control, 2012The lightweight hash function PHOTON has shown excellent hardware compactness which almost reaches the theoretical optimum and brings benefits for on-tag applications. Unlike cryptanalysis which tries to find collisions or build distinguishers on PHOTON, we apply cube attack for secret recovery of PHOTON. We focus on 1 to 3 round of PHOTON-128/16/16 in
Chia-Yu Lu +3 more
openaire +1 more source
Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon
2020 IEEE 33rd International System-on-Chip Conference (SOCC), 2020Ascon algorithm was selected in 2019, in the CAESAR competition as the first option for lightweight applications as an alternative to AES-GCM for authenticated encryption. As with other encryption algorithms, Ascon relies on some parameters and security assumptions to guarantee its security.
Jorge E. Duarte-Sanchez, Basel Halak
openaire +1 more source
Conditional cube attack on round-reduced River Keyak
Designs, Codes and Cryptography, 2017zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Wenquan Bi +4 more
openaire +2 more sources
MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes
Designs, Codes and Cryptography, 2018zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Wenquan Bi +4 more
openaire +1 more source
Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search
Journal of Cryptographic Engineering, 2019Dinur and Shamir's cube attack has attracted significant attention in the literature. Nevertheless, the lack of implementations achieving effective results casts doubts on its practical relevance. On the theoretical side, promising results have been recently achieved leveraging on division trails. The present paper follows a more practical approach and
Marco Cianfriglia +4 more
openaire +3 more sources
Applying cube attacks to stream ciphers in realistic scenarios
Cryptography and Communications, 2012zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dinur, Itai, Shamir, Adi
openaire +2 more sources
Cube attack on stream cipher E0: revisited
International Journal of Information Technology, 2022Kakumani K. C. Deepthi +2 more
openaire +1 more source
Cube and dynamic cube attacks on SIMON32/64
2014 11th International ISC Conference on Information Security and Cryptology, 2014Reihaneh Rabbaninejad +3 more
openaire +1 more source

