A Practical Platform for Cube-Attack-like Cryptanalyses
暂无分享,去创建一个
[1] Willi Meier,et al. Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium , 2009, FSE.
[2] J. Massey,et al. Communications and Cryptography: Two Sides of One Tapestry , 1994 .
[3] Adi Shamir,et al. Breaking Grain-128 with Dynamic Cube Attacks , 2011, IACR Cryptol. ePrint Arch..
[4] Michael Vielhaber. Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack , 2007, IACR Cryptol. ePrint Arch..
[5] Xuejia Lai. Higher Order Derivatives and Differential Cryptanalysis , 1994 .
[6] Ronald L. Rivest. The MD 6 hash function A proposal to NIST for SHA-3 , 2008 .
[7] Piotr Mroczkowski,et al. The Cube Attack on Stream Cipher Trivium and Quadraticity Tests , 2012, Fundam. Informaticae.
[8] Mihir Bellare,et al. Linearity testing in characteristic two , 1996, IEEE Trans. Inf. Theory.
[9] Manuel Blum,et al. Self-testing/correcting with applications to numerical problems , 1990, STOC '90.
[10] Pantelimon Stanica,et al. Cryptographic Boolean Functions and Applications , 2009 .
[11] Adi Shamir,et al. Cube Attacks on Tweakable Black Box Polynomials , 2009, IACR Cryptol. ePrint Arch..
[12] N. Rajesh Pillai,et al. Cube Attacks on Trivium , 2009, IACR Cryptol. ePrint Arch..
[13] Michael Vielhaber,et al. AIDA Breaks BIVIUM (A&B) in 1 Minute Dual Core CPU Time , 2009, IACR Cryptol. ePrint Arch..