Applying cube attacks to stream ciphers in realistic scenarios (Q2376659): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(4 intermediate revisions by 4 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: Trivium / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s12095-012-0068-4 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1974223185 / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q121602497 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium / rank
 
Normal rank
Property / cites work
 
Property / cites work: Self-testing/correcting with applications to numerical problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374924 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cube Attacks on Tweakable Black Box Polynomials / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4660688 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Testing monotonicity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking the $\epsilon$-Soundness Bound of the Linearity Test over GF(2) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Higher Order Derivatives and Differential Cryptanalysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient erasure correcting codes / rank
 
Normal rank

Latest revision as of 13:17, 6 July 2024

scientific article
Language Label Description Also known as
English
Applying cube attacks to stream ciphers in realistic scenarios
scientific article

    Statements

    Applying cube attacks to stream ciphers in realistic scenarios (English)
    0 references
    0 references
    0 references
    24 June 2013
    0 references
    cryptanalysis
    0 references
    algebraic attacks
    0 references
    cube attacks
    0 references
    robust cube attacks
    0 references
    stream ciphers
    0 references

    Identifiers