A New General Method of Searching for Cubes in Cube Attacks
暂无分享,去创建一个
Lin Ding | Lei Wang | Jie Guan | Dawu Gu | Chenhui Jin
[1] Adi Shamir,et al. Breaking Grain-128 with Dynamic Cube Attacks , 2011, IACR Cryptol. ePrint Arch..
[2] Dongdai Lin,et al. Cube Cryptanalysis of Round-Reduced ACORN , 2019, ISC.
[3] Subhamoy Maitra,et al. Certain Observations on ACORN v3 and the Implications to TMDTO Attacks , 2017, SPACE.
[4] Meicheng Liu,et al. Degree Evaluation of NFSR-Based Cryptosystems , 2017, CRYPTO.
[5] Dongdai Lin,et al. Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery , 2018, IACR Cryptol. ePrint Arch..
[6] Paul Stankovski,et al. Greedy Distinguishers and Nonrandomness Detectors , 2010, INDOCRYPT.
[7] Yosuke Todo,et al. Cube Attacks on Non-Blackbox Polynomials Based on Division Property , 2018, IEEE Transactions on Computers.
[8] Willi Meier,et al. New cube distinguishers on NFSR-based stream ciphers , 2020, Des. Codes Cryptogr..
[9] Shahram Khazaei,et al. Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers , 2008, AFRICACRYPT.
[10] Adi Shamir,et al. Cube Attacks on Tweakable Black Box Polynomials , 2009, IACR Cryptol. ePrint Arch..
[11] Alexandre Adomnicai,et al. Practical Algebraic Side-Channel Attacks Against ACORN , 2018, ICISC.
[12] Dongdai Lin,et al. Searching cubes for testing Boolean functions and its application to Trivium , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[13] Yosuke Todo,et al. Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly , 2018, IEEE Transactions on Computers.
[14] Meiqin Wang,et al. Conditional Cube Attack on Reduced-Round Keccak Sponge Function , 2017, EUROCRYPT.
[15] Dongdai Lin,et al. Conditional Cube Searching and Applications on Trivium-Variant Ciphers , 2018, ISC.
[16] Thomas Johansson,et al. A Framework for Chosen IV Statistical Analysis of Stream Ciphers , 2007, INDOCRYPT.
[17] Lin Ding,et al. Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping , 2019, Secur. Commun. Networks.
[18] Dongdai Lin,et al. Fault Attack on ACORN v3 , 2017, IACR Cryptol. ePrint Arch..
[19] Lars R. Knudsen,et al. Truncated and Higher Order Differentials , 1994, FSE.
[20] Piotr Mroczkowski,et al. The Cube Attack on Stream Cipher Trivium and Quadraticity Tests , 2012, Fundam. Informaticae.
[21] Dongdai Lin,et al. Cryptanalysis of Acorn in Nonce-Reuse Setting , 2017, Inscrypt.
[22] Xuejia Lai. Higher Order Derivatives and Differential Cryptanalysis , 1994 .
[23] Pierre-Alain Fouque,et al. Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks , 2013, IACR Cryptol. ePrint Arch..
[24] Honggang Hu,et al. A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a , 2017, IACR Cryptol. ePrint Arch..
[25] Willi Meier,et al. Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium , 2009, FSE.