With black-box access to the cipher being its unique requirement, Dinur and Shamirâs cube attack is a flexible cryptanalysis technique which can be applied to virtually any cipher. However, gaining a precise understanding of the characteristics that make a cipher vulnerable to the attack is still an open problem, and no implementation of the cube attack so far succeeded in breaking a real-world strong cipher. In this paper, we present a complete implementation of the cube attack on a GPU/CPU cluster able to improve state-of-the-art results against the Trivium cipher. In particular, our attack allows full key recovery up to 781 initialization rounds without brute-force, and yields the first ever maxterm after 800 initialization rounds. The p...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
We investigated the application of cube attacks to MORUS, a candidate in the CAESAR competition. We ...
This work describes one - way hash functions and cryptographic algorithms . It also describes their ...
Dinur and Shamir’s cube attack has attracted significant attention in the literature. Nevertheless, ...
Abstract. Dinur and Shamir have described cube attacks at EUROCRYPT ’09 and they have shown how effi...
The cube attack is one of the most important cryptanalytic techniques against Trivium. Many improvem...
Abstract. Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), whi...
Abstract. In this work, we describe the first single-key attack on the full version of Grain-128 tha...
Based on the Cube Attack by Itai Dinur and Adi Shamir and another, in the essence simi- lar, method ...
Abstract. In this paper we describe the first single-key attack which can recover the full key of th...
With the emergence of IoT and cloud computing technologies, massive data are generated from various ...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
Abstract: Basing on the original Cube attack, this paper proposes an improved method of Cube attack ...
The cube attack was proposed at the 2009 Eurocrypt. The attack derives linear polynomials for specif...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
We investigated the application of cube attacks to MORUS, a candidate in the CAESAR competition. We ...
This work describes one - way hash functions and cryptographic algorithms . It also describes their ...
Dinur and Shamir’s cube attack has attracted significant attention in the literature. Nevertheless, ...
Abstract. Dinur and Shamir have described cube attacks at EUROCRYPT ’09 and they have shown how effi...
The cube attack is one of the most important cryptanalytic techniques against Trivium. Many improvem...
Abstract. Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), whi...
Abstract. In this work, we describe the first single-key attack on the full version of Grain-128 tha...
Based on the Cube Attack by Itai Dinur and Adi Shamir and another, in the essence simi- lar, method ...
Abstract. In this paper we describe the first single-key attack which can recover the full key of th...
With the emergence of IoT and cloud computing technologies, massive data are generated from various ...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
Abstract: Basing on the original Cube attack, this paper proposes an improved method of Cube attack ...
The cube attack was proposed at the 2009 Eurocrypt. The attack derives linear polynomials for specif...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
We investigated the application of cube attacks to MORUS, a candidate in the CAESAR competition. We ...
This work describes one - way hash functions and cryptographic algorithms . It also describes their ...