Modeling for three-subset division property without unknown subset: improved cube attacks against Trivium and Grain-128aead
A division property is a generic tool to search for integral distinguishers, and automatic tools
such as MILP or SAT/SMT allow us to evaluate the propagation efficiently. In the application …
such as MILP or SAT/SMT allow us to evaluate the propagation efficiently. In the application …
Massive superpoly recovery with nested monomial predictions
Determining the exact algebraic structure or some partial information of the superpoly for a
given cube is a necessary step in the cube attack–a generic cryptanalytic technique for …
given cube is a necessary step in the cube attack–a generic cryptanalytic technique for …
Stretching cube attacks: improved methods to recover massive superpolies
Cube attacks exploit the algebraic properties of symmetric ciphers by recovering a special
polynomial, the superpoly, and subsequently the secret key. When the algebraic normal …
polynomial, the superpoly, and subsequently the secret key. When the algebraic normal …
Trivial transciphering with Trivium and TFHE
T Balenbois, JB Orfila, N Smart - Proceedings of the 11th Workshop on …, 2023 - dl.acm.org
We examine the use of Trivium and Kreyvium as transciphering mechanisms for use with the
TFHE FHE scheme. Trivium was introduced in the eSTREAM project as a general purpose …
TFHE FHE scheme. Trivium was introduced in the eSTREAM project as a general purpose …
Massive Superpoly Recovery with a Meet-in-the-Middle Framework: Improved Cube Attacks on Trivium and Kreyvium
The cube attack extracts the information of secret key bits by recovering the coefficient called
superpoly in the output bit with respect to a subset of plaintexts/IV, which is called a cube …
superpoly in the output bit with respect to a subset of plaintexts/IV, which is called a cube …
Modeling for three-subset division property without unknown subset
A division property is a generic tool to search for integral distinguishers, and automatic tools
such as MILP or SAT/SMT allow us to evaluate the propagation efficiently. In the application …
such as MILP or SAT/SMT allow us to evaluate the propagation efficiently. In the application …
From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers
J Lin, J He, Y Fan, M Wang - International Conference on Cryptology in …, 2023 - Springer
Low energy is an important aspect of hardware implementation. For energy-limited battery-
powered devices, low energy stream ciphers can play an important role. In IACR ToSC …
powered devices, low energy stream ciphers can play an important role. In IACR ToSC …
Fourteen years of cube attacks
Algebraic Cryptanalysis is a widely used technique that tackles the problem of breaking
ciphers mainly relying on the ability to express a cryptosystem as a solvable polynomial …
ciphers mainly relying on the ability to express a cryptosystem as a solvable polynomial …
Dynamic Cube Attacks against Grain-128AEAD
C Liu, T Tian - IACR Transactions on Symmetric Cryptology, 2024 - tosc.iacr.org
In this paper, we revisit the division property based dynamic cube attack on the full Grain-
128 presented by Hao et al. at FSE 2020 and demonstrate that their attack on the full Grain …
128 presented by Hao et al. at FSE 2020 and demonstrate that their attack on the full Grain …
流密码分析方法研究综述
周照存, 冯登国 - 通信学报, 2022 - infocomm-journal.com
研究密码分析方法对设计密码算法至关重要. 鉴于此, 回顾了目前主要的流密码分析方法,
研究了流密码分析方法的分类与联系, 从主要技术特点的角度将其分为基于相关性质, 差分性质 …
研究了流密码分析方法的分类与联系, 从主要技术特点的角度将其分为基于相关性质, 差分性质 …