The cube attack on stream cipher Trivium and quadraticity tests
From MaRDI portal
Publication:2883175
zbMATH Open1237.94080MaRDI QIDQ2883175FDOQ2883175
Authors: Piotr Mroczkowski, Janusz Szmidt
Publication date: 11 May 2012
Published in: Fundamenta Informaticae (Search for Journal in Brave)
Full work available at URL: http://iospress.metapress.com/content/w488x8ul32611185/fulltext.html
Recommendations
Cited In (29)
- Cryptanalysis of stream cipher LIZARD using division property and MILP based cube attack
- New cube distinguishers on NFSR-based stream ciphers
- Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks
- The MILP-aided conditional differential attack and its application to Trivium
- Advanced algebraic attack on Trivium
- A new method for searching cubes and its application to 815-round trivium
- The cube attack on Courtois toy cipher
- Some cryptanalytic results on TRIAD
- A novel GPU-based implementation of the cube attack
- Degree evaluation of NFSR-based cryptosystems
- A polynomial system for bit-based division property solving by quantum algorithm
- Breaking Grain-128 with dynamic cube attacks
- A practical key-recovery attack on 805-round Trivium
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- Improved graph-based model for recovering superpoly on Trivium
- Algebraic attacks on Trivium-like stream ciphers
- Massive superpoly recovery with nested monomial predictions
- Stretching cube attacks: improved methods to recover massive superpolies
- Applying cube attacks to stream ciphers in realistic scenarios
- Comparison of Cube Attacks Over Different Vector Spaces
- Massive superpoly recovery with a meet-in-the-middle framework. Improved cube attacks on \textsc{Trivium} and Kreyvium
- An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums
- Cube Cryptanalysis of LBlock with Noisy Leakage
- Conditional Cube Searching and Applications on Trivium-Variant Ciphers
- Cube attack on grain
- Cube Attacks on Tweakable Black Box Polynomials
- Extensions of the Cube Attack Based on Low Degree Annihilators
- QUAD: A Practical Stream Cipher with Provable Security
- An experimentally verified attack on 820-round Trivium
This page was built for publication: The cube attack on stream cipher Trivium and quadraticity tests
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2883175)