Applying cube attacks to stream ciphers in realistic scenarios
From MaRDI portal
Publication:2376659
DOI10.1007/s12095-012-0068-4zbMath1285.94057OpenAlexW1974223185WikidataQ121602497 ScholiaQ121602497MaRDI QIDQ2376659
Publication date: 24 June 2013
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-012-0068-4
Related Items (5)
Conditional differential cryptanalysis of 105 round Grain v1 ⋮ Improving bounds on probabilistic affine tests to estimate the nonlinearity of Boolean functions ⋮ Comparison of Cube Attacks Over Different Vector Spaces ⋮ Survey of information security ⋮ Cube Attack on Stream Ciphers using a Modified Linearity Test
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Self-testing/correcting with applications to numerical problems
- Breaking the $\epsilon$-Soundness Bound of the Linearity Test over GF(2)
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- Cube Attacks on Tweakable Black Box Polynomials
- Efficient erasure correcting codes
- Higher Order Derivatives and Differential Cryptanalysis
- Testing monotonicity
This page was built for publication: Applying cube attacks to stream ciphers in realistic scenarios