An improved method for evaluating secret variables and its application to WAGE
From MaRDI portal
Publication:6573675
DOI10.1007/978-981-97-0942-7_18zbMATH Open1543.94759MaRDI QIDQ6573675FDOQ6573675
Authors: Wei-Zhe Wang, Haoyang Wang, Deng Tang
Publication date: 17 July 2024
Recommendations
- Improved division property based cube attacks exploiting algebraic properties of superpoly
- MILP-based cube attack on the reduced-round WG-5 lightweight stream cipher
- Improving division property based cube attacks by removing invalid monomials
- Cube attacks on non-blackbox polynomials based on division property
- Applying cube attacks to stream ciphers in realistic scenarios
Cites Work
- Cube Attacks on Tweakable Black Box Polynomials
- Higher Order Derivatives and Differential Cryptanalysis
- WG: a family of stream ciphers with designed randomness properties
- Cryptographic properties of the Welch-Gong transformation sequence generators
- New stream cipher designs. The eSTREAM finalists
- Title not available (Why is that?)
- Structural evaluation by generalized integral property
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- Improved division property based cube attacks exploiting algebraic properties of superpoly
- Cube attacks on non-blackbox polynomials based on division property
- New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers
- Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers
- Bit-based division property and application to \textsc{Simon} family
- Correlation power analysis and higher-order masking implementation of WAGE
- Automatic search of bit-based division property for ARX ciphers and word-based division property
- Optimal parameters for the WG stream cipher family
- Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD
- MILP-aided method of searching division property using three subsets and applications
- An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums
- A practical key-recovery attack on 805-round Trivium
- Massive superpoly recovery with nested monomial predictions
This page was built for publication: An improved method for evaluating secret variables and its application to WAGE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6573675)