Cube Attack on Stream Ciphers using a Modified Linearity Test
From MaRDI portal
Publication:5069680
DOI10.1080/09720529.2014.995967zbMath1495.94070OpenAlexW2207345627WikidataQ121078408 ScholiaQ121078408MaRDI QIDQ5069680
M. Sethumadhavan, Chungath Srinivasan, K. V. Lakshmy, Utkarsh Umesan Pillai
Publication date: 19 April 2022
Published in: Journal of Discrete Mathematical Sciences and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/09720529.2014.995967
Uses Software
Cites Work
- Unnamed Item
- Self-testing/correcting with applications to numerical problems
- Applying cube attacks to stream ciphers in realistic scenarios
- Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks
- Linearity testing in characteristic two
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
- Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks
- Cube Attacks on Tweakable Black Box Polynomials
This page was built for publication: Cube Attack on Stream Ciphers using a Modified Linearity Test