Correlation cube attacks: from weak-key distinguisher to key recovery
From MaRDI portal
(Redirected from Publication:1648859)
Recommendations
- Fast Software Encryption
- From distinguishers to key recovery: improved related-key attacks on Even-Mansour
- Extensions of the Cube Attack Based on Low Degree Annihilators
- Error-tolerant side-channel cube attack revisited
- Optimizing rectangle attacks: a unified and generic framework for key recovery
- Theoretical security evaluation against side-channel cube attack with key enumeration
- scientific article; zbMATH DE number 2086708
- Fast Correlation Attacks: Methods and Countermeasures
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Cites work
- A Framework for Chosen IV Statistical Analysis of Stream Ciphers
- Advances in cryptology -- EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26--30, 2015. Proceedings. Part II
- An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware
- Bit-based division property and application to \textsc{Simon} family
- Breaking Grain-128 with dynamic cube attacks
- Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
- Conditional Differential Cryptanalysis of Trivium and KATAN
- Conditional cube attack on reduced-round Keccak sponge function
- Conditional differential cryptanalysis of NLFSR-based cryptosystems
- Cube Attacks on Tweakable Black Box Polynomials
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function
- Cube attacks on non-blackbox polynomials based on division property
- Degree evaluation of NFSR-based cryptosystems
- Fast correlation attacks on certain stream ciphers
- Greedy distinguishers and nonrandomness detectors
- Higher Order Derivatives and Differential Cryptanalysis
- Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- Keccak
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Structural evaluation by generalized integral property
- TriviA: a fast and secure authenticated encryption scheme
- Trivium
- Two Trivial Attacks on Trivium
Cited in
(17)- An experimentally verified attack on 820-round Trivium
- Improving division property based cube attacks by removing invalid monomials
- New cube distinguishers on NFSR-based stream ciphers
- Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks
- The MILP-aided conditional differential attack and its application to Trivium
- An improved degree evaluation method of NFSR-based cryptosystems
- A new method for searching cubes and its application to 815-round trivium
- Correlation cube attack revisited. Improved cube search and superpoly recovery techniques
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- A practical key-recovery attack on 805-round Trivium
- More balanced polynomials: cube attacks on 810- and 825-round Trivium with practical complexities
- A correlation attack on full SNOW-V and SNOW-Vi
- Applying cube attacks to stream ciphers in realistic scenarios
- Massive superpoly recovery with a meet-in-the-middle framework. Improved cube attacks on \textsc{Trivium} and Kreyvium
- Improved division property for ciphers with complex linear layers
- A new correlation cube attack based on division property
- Key filtering in cube attacks from the implementation aspect
This page was built for publication: Correlation cube attacks: from weak-key distinguisher to key recovery
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1648859)