Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium

From MaRDI portal
Publication:3391559


DOI10.1007/978-3-642-03317-9_1zbMath1291.94051MaRDI QIDQ3391559

Itai Dinur, Adi Shamir, Jean-Philippe Aumasson, Willi Meier

Publication date: 11 August 2009

Published in: Fast Software Encryption (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-03317-9_1


94A60: Cryptography


Related Items

Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression, Cube Attack on Stream Ciphers using a Modified Linearity Test, Conditional Cube Attack on Reduced-Round Keccak Sponge Function, Quantum Algorithms Related to $$\textit{HN}$$ -Transforms of Boolean Functions, A novel method for driven stability of NFSRs via STP, Cryptanalysis of reduced round SPEEDY, Some results on lightweight stream ciphers Fountain v1 \& lizard, A practical key-recovery attack on 805-round Trivium, Full round zero-sum distinguishers on \textsf{TinyJAMBU}-128 and \textsf{TinyJAMBU}-192 keyed-permutation in the known-key setting, Observing biases in the state: case studies with Trivium and Trivia-SC, Optimising Gröbner bases on Bivium, Correlation cube attacks: from weak-key distinguisher to key recovery, Conditional cube attack on round-reduced River Keyak, Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC, Some cryptanalytic results on TRIAD, Counting Boolean functions with faster points, New cube distinguishers on NFSR-based stream ciphers, High order differential attacks on stream ciphers, Applying cube attacks to stream ciphers in realistic scenarios, Quark: a lightweight hash, Higher order differentiation over finite fields with applications to generalising the cube attack, Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression, Another View of the Division Property, Conditional Differential Cryptanalysis of Trivium and KATAN, Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks, Breaking Grain-128 with Dynamic Cube Attacks, Cube Attacks on Tweakable Black Box Polynomials