A key-recovery attack on 855-round Trivium
From MaRDI portal
Publication:1784086
DOI10.1007/978-3-319-96881-0_6zbMATH Open1436.94066OpenAlexW2794882349MaRDI QIDQ1784086FDOQ1784086
Authors: Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier
Publication date: 26 September 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-96881-0_6
Recommendations
Cited In (12)
- New cube distinguishers on NFSR-based stream ciphers
- Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks
- The MILP-aided conditional differential attack and its application to Trivium
- Higher-order masking scheme for Trivium hardware implementation
- Advanced algebraic attack on Trivium
- Some randomness experiments on TRIVIUM
- A practical key-recovery attack on 805-round Trivium
- Modeling for three-subset division property without unknown subset
- Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD
- Related-key attack on 5-round Kuznyechik
- Two Trivial Attacks on Trivium
- An experimentally verified attack on 820-round Trivium
This page was built for publication: A key-recovery attack on 855-round Trivium
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1784086)