New MILP Modeling: Improved Conditional Cube Attacks to Keccak-based Constructions
暂无分享,去创建一个
Jian Guo | Danping Shi | Ling Song | Jian Guo | Danping Shi | Ling Song
[1] B Guido,et al. Cryptographic sponge functions , 2011 .
[2] Willi Meier,et al. Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium , 2009, FSE.
[3] Jian Guo,et al. Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP , 2018, IACR Cryptol. ePrint Arch..
[4] Xiaoyun Wang,et al. Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method , 2017, ASIACRYPT.
[5] Guido Bertoni,et al. Duplexing the sponge: single-pass authenticated encryption and other applications , 2011, IACR Cryptol. ePrint Arch..
[6] Guido Bertoni,et al. Farfalle: parallel permutation-based cryptography , 2017, IACR Trans. Symmetric Cryptol..
[7] Adi Shamir,et al. Cube Attacks on Tweakable Black Box Polynomials , 2009, IACR Cryptol. ePrint Arch..
[8] Ling Qin,et al. Cube-like Attack on Round-Reduced Initialization of Ketje Sr , 2017, IACR Trans. Symmetric Cryptol..
[9] María Naya-Plasencia,et al. State-Recovery Attacks on Modified Ketje Jr , 2018, IACR Trans. Symmetric Cryptol..
[10] Meicheng Liu,et al. New Collision Attacks on Round-Reduced Keccak , 2017, EUROCRYPT.
[11] Jian Guo,et al. Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak , 2016, ASIACRYPT.
[12] Marian Srebrny,et al. Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function , 2015, EUROCRYPT.
[13] Xiaoyun Wang,et al. MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes , 2018, IACR Cryptol. ePrint Arch..
[14] Bart Mennink,et al. Full-State Keyed Duplex with Built-In Multi-user Support , 2017, ASIACRYPT.
[15] Meiqin Wang,et al. Conditional Cube Attack on Reduced-Round Keccak Sponge Function , 2017, EUROCRYPT.
[16] Adi Shamir,et al. Improved Practical Attacks on Round-Reduced Keccak , 2012, Journal of Cryptology.
[17] Jérémy Jean,et al. Key-Recovery Attacks on Full Kravatte , 2018, IACR Trans. Symmetric Cryptol..
[18] Lei Hu,et al. Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers , 2014, ASIACRYPT.
[19] Bart Mennink,et al. Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption , 2015, ASIACRYPT.
[20] Joan Daemen,et al. Differential Propagation Analysis of Keccak , 2012, FSE.
[21] Yu Sasaki,et al. New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search , 2017, SECITC.
[22] Jian Guo,et al. Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak , 2017, CRYPTO.