Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
From MaRDI portal
Publication:2948353
DOI10.1007/978-3-662-46800-5_28zbMath1370.94506OpenAlexW574258038WikidataQ59484936 ScholiaQ59484936MaRDI QIDQ2948353
Paweł Morawiecki, Itai Dinur, Josef Pieprzyk, Marian Srebrny, Michał Straus
Publication date: 30 September 2015
Published in: Advances in Cryptology -- EUROCRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://eprints.qut.edu.au/101021/1/736.pdf
Related Items (17)
Cryptanalysis of full LowMC and LowMC-M with algebraic techniques ⋮ New Results on the SymSum Distinguisher on Round-Reduced SHA3 ⋮ Correlation cube attacks: from weak-key distinguisher to key recovery ⋮ MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes ⋮ Conditional Cube Searching and Applications on Trivium-Variant Ciphers ⋮ Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak ⋮ Cryptographic Applications of the Duplex Construction ⋮ A polynomial system for bit-based division property solving by quantum algorithm ⋮ Finding integral distinguishers with ease ⋮ An improved degree evaluation method of NFSR-based cryptosystems ⋮ Conditional cube attack on round-reduced River Keyak ⋮ Conditional Cube Attack on Reduced-Round Keccak Sponge Function ⋮ Cryptanalysis of Ascon ⋮ Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC ⋮ Practical collision attacks against round-reduced SHA-3 ⋮ Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\) ⋮ New Collision Attacks on Round-Reduced Keccak
Uses Software
This page was built for publication: Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function