[图书][B] Cryptographic Boolean functions and applications

TW Cusick, P Stanica - 2017 - books.google.com
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a
comprehensive reference for the use of Boolean functions in modern cryptography. While …

Cube attacks on non-blackbox polynomials based on division property

Y Todo, T Isobe, Y Hao, W Meier - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The cube attack is a powerful cryptanalytic technique and is especially powerful against
stream ciphers. Since we need to analyze the complicated structure of a stream cipher in the …

Cryptanalytic applications of the polynomial method for solving multivariate equation systems over GF (2)

I Dinur - Annual International Conference on the Theory and …, 2021 - Springer
At SODA 2017 Lokshtanov et al. presented the first worst-case algorithms with exponential
speedup over exhaustive search for solving polynomial equation systems of degree d in n …

Improved division property based cube attacks exploiting algebraic properties of superpoly

Y Hao, T Isobe, L Jiao, C Li, W Meier… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
At CRYPTO 2017 and IEEE Transactions on Computers in 2018, Todo et al. proposed the
division property based cube attack method making it possible to launch cube attacks with …

Conditional cube attack on reduced-round Keccak sponge function

S Huang, X Wang, G Xu, M Wang, J Zhao - … , Paris, France, April 30–May 4 …, 2017 - Springer
The security analysis of Keccak, the winner of SHA-3, has attracted considerable interest.
Recently, some attention has been paid to the analysis of keyed modes of Keccak sponge …

Cryptanalysis of Ascon

C Dobraunig, M Eichlseder, F Mendel… - Topics in Cryptology–-CT …, 2015 - Springer
We present a detailed security analysis of the CAESAR candidate Ascon. Amongst others,
cube-like, differential and linear cryptanalysis are used to evaluate the security of Ascon. Our …

ISAP–towards side-channel secure authenticated encryption

C Dobraunig, M Eichlseder, S Mangard… - IACR Transactions on …, 2017 - tosc.iacr.org
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a
serious threat to cryptographic implementations. One approach to counteract such attacks …

Cryptanalysis of full LowMC and LowMC-M with algebraic techniques

F Liu, T Isobe, W Meier - Advances in Cryptology–CRYPTO 2021: 41st …, 2021 - Springer
In this paper, we revisit the difference enumeration technique for LowMC and develop new
algebraic techniques to achieve efficient key-recovery attacks. In the original difference …

Conditional cube attack on round-reduced ASCON

Z Li, X Dong, X Wang - Cryptology ePrint Archive, 2017 - eprint.iacr.org
This paper evaluates the secure level of authenticated encryption Ascon against cube-like
method. Ascon submitted by Dobraunig et al. is one of 16 survivors of the 3rd round …

Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak

J Guo, M Liu, L Song - Advances in Cryptology–ASIACRYPT 2016: 22nd …, 2016 - Springer
In this paper, we analyze the security of round-reduced versions of the Keccak hash function
family. Based on the work pioneered by Aumasson and Meier, and Dinur et al., we formalize …