Massive Superpoly Recovery with Nested Monomial Predictions
暂无分享,去创建一个
Yosuke Todo | Meiqin Wang | Siwei Sun | Kai Hu | Qingju Wang | Meiqin Wang | Siwei Sun | Yosuke Todo | Qingju Wang | Kai Hu
[1] Pierre-Alain Fouque,et al. Increasing Precision of Division Property , 2020, IACR Trans. Symmetric Cryptol..
[2] Christina Boura,et al. Efficient MILP Modelings for Sboxes and Linear Layers of SPN ciphers , 2020, IACR Trans. Symmetric Cryptol..
[3] Jie Guan,et al. Exploring Secret Keys in Searching Integral Distinguishers Based on Division Property , 2020, IACR Trans. Symmetric Cryptol..
[4] Kai Hu,et al. An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums , 2020, IACR Cryptol. ePrint Arch..
[5] Pierre-Alain Fouque,et al. Linearly equivalent S-boxes and the division property , 2020, IACR Cryptol. ePrint Arch..
[6] Yosuke Todo,et al. Modeling for Three-Subset Division Property without Unknown Subset , 2020, Journal of Cryptology.
[7] Meiqin Wang,et al. Finding Bit-Based Division Property for Ciphers with Complex Linear Layer , 2020, IACR Cryptol. ePrint Arch..
[8] Yosuke Todo,et al. Links between Division Property and Other Cube Attack Variants , 2020, IACR Trans. Symmetric Cryptol..
[9] Chen-Dong Ye,et al. Algebraic method to recover superpolies in cube attacks , 2020, IET Inf. Secur..
[10] Jie Guan,et al. MILP-aided Method of Searching Division Property Using Three Subsets and Applications , 2019, ASIACRYPT.
[11] Tian Tian,et al. Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks? , 2019, IACR Cryptol. ePrint Arch..
[12] Kai Hu,et al. Automatic Search for A Variant of Division Property Using Three Subsets (Full Version) , 2019, IACR Cryptol. ePrint Arch..
[13] Yosuke Todo,et al. Cube Attacks on Non-Blackbox Polynomials Based on Division Property , 2018, IEEE Transactions on Computers.
[14] Yosuke Todo,et al. Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly , 2018, IEEE Transactions on Computers.
[15] Tian Tian,et al. A New Framework for Finding Nonlinear Superpolies in Cube Attacks against Trivium-Like Ciphers , 2018, IACR Cryptol. ePrint Arch..
[16] Meicheng Liu,et al. Degree Evaluation of NFSR-Based Cryptosystems , 2017, CRYPTO.
[17] Yu Sasaki,et al. New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search , 2017, SECITC.
[18] Dongdai Lin,et al. Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers , 2016, ASIACRYPT.
[19] Anne Canteaut,et al. Another View of the Division Property , 2016, CRYPTO.
[20] Achiya Bar-On,et al. A 2^70 Attack on the Full MISTY1 , 2016, CRYPTO.
[21] Anne Canteaut,et al. Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression , 2016, Journal of Cryptology.
[22] Yosuke Todo,et al. Bit-Based Division Property and Application to Simon Family , 2016, FSE.
[23] Yosuke Todo,et al. Integral Cryptanalysis on Full MISTY1 , 2015, Journal of Cryptology.
[24] Jason Smith,et al. The SIMON and SPECK lightweight block ciphers , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[25] Yosuke Todo,et al. Structural Evaluation by Generalized Integral Property , 2015, EUROCRYPT.
[26] Lei Hu,et al. Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers , 2014, ASIACRYPT.
[27] Pierre-Alain Fouque,et al. Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks , 2013, IACR Cryptol. ePrint Arch..
[28] Willi Meier,et al. Conditional Differential Cryptanalysis of Grain-128a , 2012, CANS.
[29] Piotr Mroczkowski,et al. The Cube Attack on Stream Cipher Trivium and Quadraticity Tests , 2012, Fundam. Informaticae.
[30] Martin Hell,et al. Grain-128a: a new version of Grain-128 with optional authentication , 2011, Int. J. Wirel. Mob. Comput..
[31] Adi Shamir,et al. Cube Attacks on Tweakable Black Box Polynomials , 2009, IACR Cryptol. ePrint Arch..
[32] David A. Wagner,et al. Integral Cryptanalysis , 2002, FSE.
[33] Mitsuru Matsui,et al. New Block Encryption Algorithm MISTY , 1997, FSE.
[34] Vincent Rijmen,et al. The Block Cipher Square , 1997, FSE.
[35] Lars R. Knudsen,et al. Truncated and Higher Order Differentials , 1994, FSE.
[36] Yao Sun,et al. Cube Attack against 843-Round Trivium , 2021, IACR Cryptol. ePrint Arch..
[37] Donghoon Chang,et al. Recovering the Key from the Internal State of Grain-128AEAD , 2021, IACR Cryptol. ePrint Arch..
[38] Yosuke Todo,et al. Lower Bounds on the Degree of Block Ciphers , 2020, IACR Cryptol. ePrint Arch..
[39] Tian Tian,et al. A Practical Key-Recovery Attack on 805-Round Trivium , 2020, IACR Cryptol. ePrint Arch..
[40] Kai Zhang,et al. A Practical Method to Recover Exact Superpoly in Cube Attack , 2019, IACR Cryptol. ePrint Arch..
[41] Xuejia Lai. Higher Order Derivatives and Differential Cryptanalysis , 1994 .