Abstract. In this paper we describe the first single-key attack which can recover the full key of the full version of Grain-128 for arbitrary keys by an algorithm which is significantly faster than exhaustive search (by a factor of about 238). It is based on a new version of a cube tester, which uses an improved choice of dynamic variables to eliminate the previously made assumption that ten particular key bits are zero. In addition, the new attack is much faster than the previous weak-key attack, and has a simpler key recovery process. Since it is extremely difficult to mathemat-ically analyze the expected behavior of such attacks, we implemented it on RIVYERA, which is a new massively parallel reconfigurable hardware, and tested its main ...
Abstract. Statistical attacks against block ciphers usually exploit “char-acteristics”. A characteri...
This paper presents an effective field-programmable gate array (FPGA)-based hardware implementation ...
Abstract: Basing on the original Cube attack, this paper proposes an improved method of Cube attack ...
Abstract. In this work, we describe the first single-key attack on the full version of Grain-128 tha...
Dinur and Shamir’s cube attack has attracted significant attention in the literature. Nevertheless, ...
With black-box access to the cipher being its unique requirement, Dinur and Shamirâs cube attack is ...
Abstract. In this paper, we describe a variant of the cube attack with much better-understood Prepro...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
In this paper, we propose a series of techniques that can be used to determine the missing IV terms ...
Abstract. Very few differential fault attacks (DFA) were reported on Grain-128 so far. In this paper...
In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Ph...
CRYSTALS-Kyber has been recently selected by the NIST as a new public-key encryption and key-establi...
Abstract. The lightweight encryption algorithm (LEA) is a 128-bit block cipher introduced in 2013. I...
Abstract. Khudra is a lightweight block cipher designed for Field Pro-grammable Gate Array (FPGA) ba...
This paper presents FPGA implementations of two cryptanalytic attacks against DES. Linear cryptanaly...
Abstract. Statistical attacks against block ciphers usually exploit “char-acteristics”. A characteri...
This paper presents an effective field-programmable gate array (FPGA)-based hardware implementation ...
Abstract: Basing on the original Cube attack, this paper proposes an improved method of Cube attack ...
Abstract. In this work, we describe the first single-key attack on the full version of Grain-128 tha...
Dinur and Shamir’s cube attack has attracted significant attention in the literature. Nevertheless, ...
With black-box access to the cipher being its unique requirement, Dinur and Shamirâs cube attack is ...
Abstract. In this paper, we describe a variant of the cube attack with much better-understood Prepro...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
In this paper, we propose a series of techniques that can be used to determine the missing IV terms ...
Abstract. Very few differential fault attacks (DFA) were reported on Grain-128 so far. In this paper...
In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Ph...
CRYSTALS-Kyber has been recently selected by the NIST as a new public-key encryption and key-establi...
Abstract. The lightweight encryption algorithm (LEA) is a 128-bit block cipher introduced in 2013. I...
Abstract. Khudra is a lightweight block cipher designed for Field Pro-grammable Gate Array (FPGA) ba...
This paper presents FPGA implementations of two cryptanalytic attacks against DES. Linear cryptanaly...
Abstract. Statistical attacks against block ciphers usually exploit “char-acteristics”. A characteri...
This paper presents an effective field-programmable gate array (FPGA)-based hardware implementation ...
Abstract: Basing on the original Cube attack, this paper proposes an improved method of Cube attack ...