Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function
暂无分享,去创建一个
Marian Srebrny | Josef Pieprzyk | Itai Dinur | Pawel Morawiecki | Michal Straus | J. Pieprzyk | Itai Dinur | P. Morawiecki | M. Srebrny | Michal Straus
[1] Joel Lathrop. Cube attacks on cryptographic hash functions , 2009 .
[2] Xuejia Lai. Higher Order Derivatives and Differential Cryptanalysis , 1994 .
[3] Willi Meier,et al. Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium , 2009, FSE.
[4] Adi Shamir,et al. New Attacks on Keccak-224 and Keccak-256 , 2012, FSE.
[5] Marian Srebrny,et al. Security margin evaluation of SHA-3 contest finalists through SAT-based attacks , 2012, IACR Cryptol. ePrint Arch..
[6] Adi Shamir,et al. Cube Attacks on Tweakable Black Box Polynomials , 2009, IACR Cryptol. ePrint Arch..
[7] Michael Vielhaber. Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack , 2007, IACR Cryptol. ePrint Arch..
[8] Gregory V. Bard,et al. Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers , 2010, INDOCRYPT.
[9] María Naya-Plasencia,et al. Practical Analysis of Reduced-Round Keccak , 2011, INDOCRYPT.