Cube Attack on Stream Ciphers using a Modified Linearity Test
From MaRDI portal
Publication:5069680
DOI10.1080/09720529.2014.995967zbMATH Open1495.94070OpenAlexW2207345627WikidataQ121078408 ScholiaQ121078408MaRDI QIDQ5069680FDOQ5069680
Authors: Chungath Srinivasan, Utkarsh Umesan Pillai, K. V. Lakshmy, M. Sethumadhavan
Publication date: 19 April 2022
Published in: Journal of Discrete Mathematical Sciences and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/09720529.2014.995967
Cites Work
- Self-testing/correcting with applications to numerical problems
- Applying cube attacks to stream ciphers in realistic scenarios
- Linearity testing in characteristic two
- Cube Attacks on Tweakable Black Box Polynomials
- Title not available (Why is that?)
- Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks
- Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
Cited In (3)
Uses Software
This page was built for publication: Cube Attack on Stream Ciphers using a Modified Linearity Test
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5069680)