Massive Superpoly Recovery with Nested Monomial Predictions

[1]  Pierre-Alain Fouque,et al.  Increasing Precision of Division Property , 2020, IACR Trans. Symmetric Cryptol..

[2]  Christina Boura,et al.  Efficient MILP Modelings for Sboxes and Linear Layers of SPN ciphers , 2020, IACR Trans. Symmetric Cryptol..

[3]  Jie Guan,et al.  Exploring Secret Keys in Searching Integral Distinguishers Based on Division Property , 2020, IACR Trans. Symmetric Cryptol..

[4]  Kai Hu,et al.  An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums , 2020, IACR Cryptol. ePrint Arch..

[5]  Pierre-Alain Fouque,et al.  Linearly equivalent S-boxes and the division property , 2020, IACR Cryptol. ePrint Arch..

[6]  Yosuke Todo,et al.  Modeling for Three-Subset Division Property without Unknown Subset , 2020, Journal of Cryptology.

[7]  Meiqin Wang,et al.  Finding Bit-Based Division Property for Ciphers with Complex Linear Layer , 2020, IACR Cryptol. ePrint Arch..

[8]  Yosuke Todo,et al.  Links between Division Property and Other Cube Attack Variants , 2020, IACR Trans. Symmetric Cryptol..

[9]  Chen-Dong Ye,et al.  Algebraic method to recover superpolies in cube attacks , 2020, IET Inf. Secur..

[10]  Jie Guan,et al.  MILP-aided Method of Searching Division Property Using Three Subsets and Applications , 2019, ASIACRYPT.

[11]  Tian Tian,et al.  Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks? , 2019, IACR Cryptol. ePrint Arch..

[12]  Kai Hu,et al.  Automatic Search for A Variant of Division Property Using Three Subsets (Full Version) , 2019, IACR Cryptol. ePrint Arch..

[13]  Yosuke Todo,et al.  Cube Attacks on Non-Blackbox Polynomials Based on Division Property , 2018, IEEE Transactions on Computers.

[14]  Yosuke Todo,et al.  Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly , 2018, IEEE Transactions on Computers.

[15]  Tian Tian,et al.  A New Framework for Finding Nonlinear Superpolies in Cube Attacks against Trivium-Like Ciphers , 2018, IACR Cryptol. ePrint Arch..

[16]  Meicheng Liu,et al.  Degree Evaluation of NFSR-Based Cryptosystems , 2017, CRYPTO.

[17]  Yu Sasaki,et al.  New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search , 2017, SECITC.

[18]  Dongdai Lin,et al.  Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers , 2016, ASIACRYPT.

[19]  Anne Canteaut,et al.  Another View of the Division Property , 2016, CRYPTO.

[20]  Achiya Bar-On,et al.  A 2^70 Attack on the Full MISTY1 , 2016, CRYPTO.

[21]  Anne Canteaut,et al.  Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression , 2016, Journal of Cryptology.

[22]  Yosuke Todo,et al.  Bit-Based Division Property and Application to Simon Family , 2016, FSE.

[23]  Yosuke Todo,et al.  Integral Cryptanalysis on Full MISTY1 , 2015, Journal of Cryptology.

[24]  Jason Smith,et al.  The SIMON and SPECK lightweight block ciphers , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[25]  Yosuke Todo,et al.  Structural Evaluation by Generalized Integral Property , 2015, EUROCRYPT.

[26]  Lei Hu,et al.  Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers , 2014, ASIACRYPT.

[27]  Pierre-Alain Fouque,et al.  Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks , 2013, IACR Cryptol. ePrint Arch..

[28]  Willi Meier,et al.  Conditional Differential Cryptanalysis of Grain-128a , 2012, CANS.

[29]  Piotr Mroczkowski,et al.  The Cube Attack on Stream Cipher Trivium and Quadraticity Tests , 2012, Fundam. Informaticae.

[30]  Martin Hell,et al.  Grain-128a: a new version of Grain-128 with optional authentication , 2011, Int. J. Wirel. Mob. Comput..

[31]  Adi Shamir,et al.  Cube Attacks on Tweakable Black Box Polynomials , 2009, IACR Cryptol. ePrint Arch..

[32]  David A. Wagner,et al.  Integral Cryptanalysis , 2002, FSE.

[33]  Mitsuru Matsui,et al.  New Block Encryption Algorithm MISTY , 1997, FSE.

[34]  Vincent Rijmen,et al.  The Block Cipher Square , 1997, FSE.

[35]  Lars R. Knudsen,et al.  Truncated and Higher Order Differentials , 1994, FSE.

[36]  Yao Sun,et al.  Cube Attack against 843-Round Trivium , 2021, IACR Cryptol. ePrint Arch..

[37]  Donghoon Chang,et al.  Recovering the Key from the Internal State of Grain-128AEAD , 2021, IACR Cryptol. ePrint Arch..

[38]  Yosuke Todo,et al.  Lower Bounds on the Degree of Block Ciphers , 2020, IACR Cryptol. ePrint Arch..

[39]  Tian Tian,et al.  A Practical Key-Recovery Attack on 805-Round Trivium , 2020, IACR Cryptol. ePrint Arch..

[40]  Kai Zhang,et al.  A Practical Method to Recover Exact Superpoly in Cube Attack , 2019, IACR Cryptol. ePrint Arch..

[41]  Xuejia Lai Higher Order Derivatives and Differential Cryptanalysis , 1994 .