Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium

From MaRDI portal
Revision as of 17:57, 4 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3391559

DOI10.1007/978-3-642-03317-9_1zbMath1291.94051OpenAlexW2164455525MaRDI QIDQ3391559

Itai Dinur, Adi Shamir, Jean-Philippe Aumasson, Willi Meier

Publication date: 11 August 2009

Published in: Fast Software Encryption (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-03317-9_1



Related Items

Conditional Differential Cryptanalysis of Trivium and KATAN, High order differential attacks on stream ciphers, Applying cube attacks to stream ciphers in realistic scenarios, Quark: a lightweight hash, Correlation cube attacks: from weak-key distinguisher to key recovery, Cube Attack on Stream Ciphers using a Modified Linearity Test, Higher order differentiation over finite fields with applications to generalising the cube attack, Some cryptanalytic results on TRIAD, Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression, Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks, A novel method for driven stability of NFSRs via STP, Cryptanalysis of reduced round SPEEDY, Some results on lightweight stream ciphers Fountain v1 \& lizard, Optimising Gröbner bases on Bivium, A practical key-recovery attack on 805-round Trivium, Full round zero-sum distinguishers on \textsf{TinyJAMBU}-128 and \textsf{TinyJAMBU}-192 keyed-permutation in the known-key setting, Counting Boolean functions with faster points, Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression, Breaking Grain-128 with Dynamic Cube Attacks, Observing biases in the state: case studies with Trivium and Trivia-SC, Conditional cube attack on round-reduced River Keyak, Conditional Cube Attack on Reduced-Round Keccak Sponge Function, Quantum Algorithms Related to $$\textit{HN}$$ -Transforms of Boolean Functions, Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC, New cube distinguishers on NFSR-based stream ciphers, Cube Attacks on Tweakable Black Box Polynomials, Another View of the Division Property