[图书][B] Cryptographic Boolean functions and applications
TW Cusick, P Stanica - 2017 - books.google.com
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a
comprehensive reference for the use of Boolean functions in modern cryptography. While …
comprehensive reference for the use of Boolean functions in modern cryptography. While …
Cube attacks on non-blackbox polynomials based on division property
The cube attack is a powerful cryptanalytic technique and is especially powerful against
stream ciphers. Since we need to analyze the complicated structure of a stream cipher in the …
stream ciphers. Since we need to analyze the complicated structure of a stream cipher in the …
Cryptanalytic applications of the polynomial method for solving multivariate equation systems over GF (2)
I Dinur - Annual International Conference on the Theory and …, 2021 - Springer
At SODA 2017 Lokshtanov et al. presented the first worst-case algorithms with exponential
speedup over exhaustive search for solving polynomial equation systems of degree d in n …
speedup over exhaustive search for solving polynomial equation systems of degree d in n …
Improved division property based cube attacks exploiting algebraic properties of superpoly
At CRYPTO 2017 and IEEE Transactions on Computers in 2018, Todo et al. proposed the
division property based cube attack method making it possible to launch cube attacks with …
division property based cube attack method making it possible to launch cube attacks with …
Conditional cube attack on reduced-round Keccak sponge function
The security analysis of Keccak, the winner of SHA-3, has attracted considerable interest.
Recently, some attention has been paid to the analysis of keyed modes of Keccak sponge …
Recently, some attention has been paid to the analysis of keyed modes of Keccak sponge …
Cryptanalysis of Ascon
We present a detailed security analysis of the CAESAR candidate Ascon. Amongst others,
cube-like, differential and linear cryptanalysis are used to evaluate the security of Ascon. Our …
cube-like, differential and linear cryptanalysis are used to evaluate the security of Ascon. Our …
ISAP–towards side-channel secure authenticated encryption
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a
serious threat to cryptographic implementations. One approach to counteract such attacks …
serious threat to cryptographic implementations. One approach to counteract such attacks …
Cryptanalysis of full LowMC and LowMC-M with algebraic techniques
In this paper, we revisit the difference enumeration technique for LowMC and develop new
algebraic techniques to achieve efficient key-recovery attacks. In the original difference …
algebraic techniques to achieve efficient key-recovery attacks. In the original difference …
Conditional cube attack on round-reduced ASCON
This paper evaluates the secure level of authenticated encryption Ascon against cube-like
method. Ascon submitted by Dobraunig et al. is one of 16 survivors of the 3rd round …
method. Ascon submitted by Dobraunig et al. is one of 16 survivors of the 3rd round …
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
In this paper, we analyze the security of round-reduced versions of the Keccak hash function
family. Based on the work pioneered by Aumasson and Meier, and Dinur et al., we formalize …
family. Based on the work pioneered by Aumasson and Meier, and Dinur et al., we formalize …