At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an initialization vector. In a stream cipher setting where the filter function is known, we can extend it to the cube attack with annihilators: By applying the cube attack to Boolean functions for which we can find low-degree multiples (equivalently annihilators), the attack complexity can be improved. When the size of the filter function is smaller than the LFSR, we can improve the attack complexity further by considering a sliding window version of the cube attack with annihilators. Finally, we extend the cube attack to vectorial Boolean functions by finding implicit ...
The design and analysis of lightweight block ciphers is gaining increasing popularity due to the gen...
Abstract. In this paper we mount the cube attack on the Keccak sponge function. The cube attack, for...
Basing on the original Cube attack, this paper proposes an improved method of Cube attack on stream ...
Abstract. Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), whi...
Based on the Cube Attack by Itai Dinur and Adi Shamir and another, in the essence simi- lar, method ...
Abstract: Basing on the original Cube attack, this paper proposes an improved method of Cube attack ...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
In this paper, we propose an ecient method for extracting simple low-degree equations (e.g. quadrat...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
We generalise the cube attack of Dinur and Shamir (and the similar AIDA attack of Vielhaber) to a mo...
We generalise the cube attack of Dinur and Shamir (and the similar AIDA attack of Vielhaber) to a mo...
The cube attack is an algebraic attack that allows an adversary to extract low degree polynomial equ...
Recent algebraic attacks on LFSR-based stream ciphers and S-boxes have generated much interest as th...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
The design and analysis of lightweight block ciphers is gaining increasing popularity due to the gen...
Abstract. In this paper we mount the cube attack on the Keccak sponge function. The cube attack, for...
Basing on the original Cube attack, this paper proposes an improved method of Cube attack on stream ...
Abstract. Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), whi...
Based on the Cube Attack by Itai Dinur and Adi Shamir and another, in the essence simi- lar, method ...
Abstract: Basing on the original Cube attack, this paper proposes an improved method of Cube attack ...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
In this paper, we propose an ecient method for extracting simple low-degree equations (e.g. quadrat...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
We generalise the cube attack of Dinur and Shamir (and the similar AIDA attack of Vielhaber) to a mo...
We generalise the cube attack of Dinur and Shamir (and the similar AIDA attack of Vielhaber) to a mo...
The cube attack is an algebraic attack that allows an adversary to extract low degree polynomial equ...
Recent algebraic attacks on LFSR-based stream ciphers and S-boxes have generated much interest as th...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
The design and analysis of lightweight block ciphers is gaining increasing popularity due to the gen...
Abstract. In this paper we mount the cube attack on the Keccak sponge function. The cube attack, for...
Basing on the original Cube attack, this paper proposes an improved method of Cube attack on stream ...