A New General Method of Searching for Cubes in Cube Attacks

[1]  Adi Shamir,et al.  Breaking Grain-128 with Dynamic Cube Attacks , 2011, IACR Cryptol. ePrint Arch..

[2]  Dongdai Lin,et al.  Cube Cryptanalysis of Round-Reduced ACORN , 2019, ISC.

[3]  Subhamoy Maitra,et al.  Certain Observations on ACORN v3 and the Implications to TMDTO Attacks , 2017, SPACE.

[4]  Meicheng Liu,et al.  Degree Evaluation of NFSR-Based Cryptosystems , 2017, CRYPTO.

[5]  Dongdai Lin,et al.  Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery , 2018, IACR Cryptol. ePrint Arch..

[6]  Paul Stankovski,et al.  Greedy Distinguishers and Nonrandomness Detectors , 2010, INDOCRYPT.

[7]  Yosuke Todo,et al.  Cube Attacks on Non-Blackbox Polynomials Based on Division Property , 2018, IEEE Transactions on Computers.

[8]  Willi Meier,et al.  New cube distinguishers on NFSR-based stream ciphers , 2020, Des. Codes Cryptogr..

[9]  Shahram Khazaei,et al.  Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers , 2008, AFRICACRYPT.

[10]  Adi Shamir,et al.  Cube Attacks on Tweakable Black Box Polynomials , 2009, IACR Cryptol. ePrint Arch..

[11]  Alexandre Adomnicai,et al.  Practical Algebraic Side-Channel Attacks Against ACORN , 2018, ICISC.

[12]  Dongdai Lin,et al.  Searching cubes for testing Boolean functions and its application to Trivium , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[13]  Yosuke Todo,et al.  Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly , 2018, IEEE Transactions on Computers.

[14]  Meiqin Wang,et al.  Conditional Cube Attack on Reduced-Round Keccak Sponge Function , 2017, EUROCRYPT.

[15]  Dongdai Lin,et al.  Conditional Cube Searching and Applications on Trivium-Variant Ciphers , 2018, ISC.

[16]  Thomas Johansson,et al.  A Framework for Chosen IV Statistical Analysis of Stream Ciphers , 2007, INDOCRYPT.

[17]  Lin Ding,et al.  Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping , 2019, Secur. Commun. Networks.

[18]  Dongdai Lin,et al.  Fault Attack on ACORN v3 , 2017, IACR Cryptol. ePrint Arch..

[19]  Lars R. Knudsen,et al.  Truncated and Higher Order Differentials , 1994, FSE.

[20]  Piotr Mroczkowski,et al.  The Cube Attack on Stream Cipher Trivium and Quadraticity Tests , 2012, Fundam. Informaticae.

[21]  Dongdai Lin,et al.  Cryptanalysis of Acorn in Nonce-Reuse Setting , 2017, Inscrypt.

[22]  Xuejia Lai Higher Order Derivatives and Differential Cryptanalysis , 1994 .

[23]  Pierre-Alain Fouque,et al.  Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks , 2013, IACR Cryptol. ePrint Arch..

[24]  Honggang Hu,et al.  A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a , 2017, IACR Cryptol. ePrint Arch..

[25]  Willi Meier,et al.  Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium , 2009, FSE.