In this paper, we investigate the security of the NOEKEON block cipher against side channel cube attacks. NOEKEON was proposed by Daemen et al. for the NESSIE project. The block size and the key size are both 128 bits. The cube attack, introduced by Dinur and Shamir at EUROCRYPT 2009, is a new type of algebraic cryptanalysis. The attack may be applied if the adversary has access to a single bit of information that can be represented by a low degree multivariate polynomial over GF(2) of secret and public variables. In the side channel attack model, the attacker is assumed to have access to some leaked information about the internal state of the cipher as well as the plaintext and ciphertext. Adopting the notion of a single bit leakage as for...
In an effort to circumvent the high cost of standard countermeasures against side-channel attacks in...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
Abstract. In 2002, algebraic attacks using overdefined systems of equa-tions have been proposed as a...
In this paper, we investigate the security of the NOEKEON block cipher against side channel cube att...
NOEKEON is a block cipher having key-size 128 and block size 128,proposed by Daemen, J et al.Shekh F...
The design and analysis of lightweight block ciphers is gaining increasing popularity due to the gen...
In this paper, we propose an ecient method for extracting simple low-degree equations (e.g. quadrat...
In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Ph...
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employe...
Abstract. Side-channel cube attacks are a class of leakage attacks on block ciphers in which the att...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
Part 1: Modern CryptographyInternational audienceIn this research, a recently proposed lightweight b...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
This paper evaluates the security level of the River Keyak against the cube-like attack. River Keyak...
In cube attacks, key filtering is a basic step of identifying the correct key candidates by referrin...
In an effort to circumvent the high cost of standard countermeasures against side-channel attacks in...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
Abstract. In 2002, algebraic attacks using overdefined systems of equa-tions have been proposed as a...
In this paper, we investigate the security of the NOEKEON block cipher against side channel cube att...
NOEKEON is a block cipher having key-size 128 and block size 128,proposed by Daemen, J et al.Shekh F...
The design and analysis of lightweight block ciphers is gaining increasing popularity due to the gen...
In this paper, we propose an ecient method for extracting simple low-degree equations (e.g. quadrat...
In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Ph...
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employe...
Abstract. Side-channel cube attacks are a class of leakage attacks on block ciphers in which the att...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
Part 1: Modern CryptographyInternational audienceIn this research, a recently proposed lightweight b...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
This paper evaluates the security level of the River Keyak against the cube-like attack. River Keyak...
In cube attacks, key filtering is a basic step of identifying the correct key candidates by referrin...
In an effort to circumvent the high cost of standard countermeasures against side-channel attacks in...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
Abstract. In 2002, algebraic attacks using overdefined systems of equa-tions have been proposed as a...