Basing on the original Cube attack, this paper proposes an improved method of Cube attack on stream ciphers, which makes improvement on the pre-processing phase of the original attack. The new method can induce maxterms of higher-order from those of lower-order by the trade-off between time and space, thus recovering more key bits and reducing the search complexity on higher-dimension. In this paper, the improved attack is applied to Lili-128 algorithm and reduced variants of Trivium algorithm. We can recover 88 key bits of Lili-128 algorithm within time complexity of 14 O(2 ) and 48 key bits of Trivium algorithm can be recovered by cubes with dimension no larger than 8 when the initialization round is 576, the results are much better than ...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
International audienceThe cube attack is a powerful cryptanalysis technique against symmetric primit...
Abstract: Basing on the original Cube attack, this paper proposes an improved method of Cube attack ...
Abstract. Dinur and Shamir have described cube attacks at EUROCRYPT ’09 and they have shown how effi...
Based on the Cube Attack by Itai Dinur and Adi Shamir and another, in the essence simi- lar, method ...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
We investigated the application of cube attacks to MORUS, a candidate in the CAESAR competition. We ...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
Cube attack is one powerful method in the cryptanalysis of NFSR-based ciphers. In this paper, we pro...
In this paper we demonstrate a fast correlation attack on the recently proposed stream cipher LILI-1...
This paper presents a new simple distinguishing attack that can be applied on stream ciphers constru...
In this paper, we propose an ecient method for extracting simple low-degree equations (e.g. quadrat...
At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to ...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
International audienceThe cube attack is a powerful cryptanalysis technique against symmetric primit...
Abstract: Basing on the original Cube attack, this paper proposes an improved method of Cube attack ...
Abstract. Dinur and Shamir have described cube attacks at EUROCRYPT ’09 and they have shown how effi...
Based on the Cube Attack by Itai Dinur and Adi Shamir and another, in the essence simi- lar, method ...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
We investigated the application of cube attacks to MORUS, a candidate in the CAESAR competition. We ...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
Cube attack is one powerful method in the cryptanalysis of NFSR-based ciphers. In this paper, we pro...
In this paper we demonstrate a fast correlation attack on the recently proposed stream cipher LILI-1...
This paper presents a new simple distinguishing attack that can be applied on stream ciphers constru...
In this paper, we propose an ecient method for extracting simple low-degree equations (e.g. quadrat...
At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to ...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
International audienceThe cube attack is a powerful cryptanalysis technique against symmetric primit...