An experimentally verified attack on 820-round Trivium
From MaRDI portal
Publication:6134030
DOI10.1007/978-3-031-26553-2_19zbMATH Open1519.94084MaRDI QIDQ6134030FDOQ6134030
Authors:
Publication date: 21 August 2023
Published in: Information Security and Cryptology (Search for Journal in Brave)
Recommendations
- A practical key-recovery attack on 805-round Trivium
- Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks
- The cube attack on stream cipher Trivium and quadraticity tests
- A key-recovery attack on 855-round Trivium
- Correlation cube attacks: from weak-key distinguisher to key recovery
Cites Work
- Cube Attacks on Tweakable Black Box Polynomials
- Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks
- Improved division property based cube attacks exploiting algebraic properties of superpoly
- Cube attacks on non-blackbox polynomials based on division property
- Correlation cube attacks: from weak-key distinguisher to key recovery
- A key-recovery attack on 855-round Trivium
- A new framework for finding nonlinear superpolies in cube attacks against Trivium-like ciphers
- Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD
- MILP-aided method of searching division property using three subsets and applications
- An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums
- A practical key-recovery attack on 805-round Trivium
- Massive superpoly recovery with nested monomial predictions
Cited In (19)
- New cube distinguishers on NFSR-based stream ciphers
- Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks
- The MILP-aided conditional differential attack and its application to Trivium
- Cube attacks on non-blackbox polynomials based on division property
- The cube attack on stream cipher Trivium and quadraticity tests
- Advanced algebraic attack on Trivium
- A new method for searching cubes and its application to 815-round trivium
- Correlation cube attack revisited. Improved cube search and superpoly recovery techniques
- A novel GPU-based implementation of the cube attack
- A practical key-recovery attack on 805-round Trivium
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- A key-recovery attack on 855-round Trivium
- A new framework for finding nonlinear superpolies in cube attacks against Trivium-like ciphers
- More balanced polynomials: cube attacks on 810- and 825-round Trivium with practical complexities
- Improved graph-based model for recovering superpoly on Trivium
- Massive superpoly recovery with a meet-in-the-middle framework. Improved cube attacks on \textsc{Trivium} and Kreyvium
- Conditional Cube Searching and Applications on Trivium-Variant Ciphers
- A new correlation cube attack based on division property
- Key filtering in cube attacks from the implementation aspect
This page was built for publication: An experimentally verified attack on 820-round Trivium
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6134030)