Abstract. In this work, we describe the first single-key attack on the full version of Grain-128 that can recover arbitrary keys. Our attack is based on a new version of a cube tester, which is a factor of about 238 faster than exhaustive search. To practically verify our results, we implemented the attack on the reconfigurable hardware cluster RIVYERA and tested the main components of the attack for dozens of random keys. Our experiments successfully demonstrated the correctness and expected com-plexity of the attack by finding a very significant bias in our new cube tester for about 7.5 % of the tested keys. This is the first time that the main components of a complex analytical attack against a digital full-size cipher were successfully ...
Abstract. In this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak)...
International audienceIn this paper, we comprehensively study the resistance of keyed variants of SH...
This paper presents FPGA implementations of two cryptanalytic attacks against DES. Linear cryptanaly...
Abstract. In this paper we describe the first single-key attack which can recover the full key of th...
Dinur and Shamir’s cube attack has attracted significant attention in the literature. Nevertheless, ...
With black-box access to the cipher being its unique requirement, Dinur and Shamirâs cube attack is ...
v1 to the estream call for stream cipher proposals and it also became one estream finalists in the h...
Abstract. Statistical attacks against block ciphers usually exploit “char-acteristics”. A characteri...
CRYSTALS-Kyber has been recently selected by the NIST as a new public-key encryption and key-establi...
Abstract. Very few differential fault attacks (DFA) were reported on Grain-128 so far. In this paper...
Modern reconfigurable technologies can have a number of inherent advantages for cryptanalytic applic...
Abstract. The lightweight encryption algorithm (LEA) is a 128-bit block cipher introduced in 2013. I...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
In this paper, we propose a series of techniques that can be used to determine the missing IV terms ...
Abstract. In this paper, we describe a variant of the cube attack with much better-understood Prepro...
Abstract. In this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak)...
International audienceIn this paper, we comprehensively study the resistance of keyed variants of SH...
This paper presents FPGA implementations of two cryptanalytic attacks against DES. Linear cryptanaly...
Abstract. In this paper we describe the first single-key attack which can recover the full key of th...
Dinur and Shamir’s cube attack has attracted significant attention in the literature. Nevertheless, ...
With black-box access to the cipher being its unique requirement, Dinur and Shamirâs cube attack is ...
v1 to the estream call for stream cipher proposals and it also became one estream finalists in the h...
Abstract. Statistical attacks against block ciphers usually exploit “char-acteristics”. A characteri...
CRYSTALS-Kyber has been recently selected by the NIST as a new public-key encryption and key-establi...
Abstract. Very few differential fault attacks (DFA) were reported on Grain-128 so far. In this paper...
Modern reconfigurable technologies can have a number of inherent advantages for cryptanalytic applic...
Abstract. The lightweight encryption algorithm (LEA) is a 128-bit block cipher introduced in 2013. I...
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM fina...
In this paper, we propose a series of techniques that can be used to determine the missing IV terms ...
Abstract. In this paper, we describe a variant of the cube attack with much better-understood Prepro...
Abstract. In this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak)...
International audienceIn this paper, we comprehensively study the resistance of keyed variants of SH...
This paper presents FPGA implementations of two cryptanalytic attacks against DES. Linear cryptanaly...