Conditional Cube Searching and Applications on Trivium-Variant Ciphers
From MaRDI portal
Publication:6108838
DOI10.1007/978-3-319-99136-8_9zbMath1515.68125OpenAlexW2885091993MaRDI QIDQ6108838
Xiao-Juan Zhang, Dong-Dai Lin, Meicheng Liu
Publication date: 30 June 2023
Published in: Developments in Language Theory (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-99136-8_9
Searching and sorting (68P10) Cryptography (94A60) Data encryption (aspects in computer science) (68P25)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Degree evaluation of NFSR-based cryptosystems
- Cube attacks on non-blackbox polynomials based on division property
- TriviA: a fast and secure authenticated encryption scheme
- Conditional cube attack on round-reduced River Keyak
- Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks
- Structural Evaluation by Generalized Integral Property
- Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
- Breaking Grain-128 with Dynamic Cube Attacks
- Higher-Order Differential Properties of Keccak and Luffa
- An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware
- Analysis of Trivium Using Compressed Right Hand Side Equations
- Trivium
- Cube Attacks on Tweakable Black Box Polynomials
- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
- Higher Order Differential Attack of a CAST Cipher
- Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
- Advances in Cryptology - CRYPTO 2003
- Conditional Cube Attack on Reduced-Round Keccak Sponge Function
This page was built for publication: Conditional Cube Searching and Applications on Trivium-Variant Ciphers