In this paper, we investigate the security of the NOEKEON block cipher against side channel cube attacks. NOEKEON was proposed by Daemen et al. for the NESSIE project. The block size and the key size are both 128 bits. The cube attack, introduced by Dinur and Shamir at EUROCRYPT 2009, is a new type of algebraic cryptanalysis. The attack may be applied if the adversary has access to a single bit of information that can be represented by a low degree multivariate polynomial over GF(2) of secret and public variables. In the side channel attack model, the attacker is assumed to have access to some leaked information about the internal state of the cipher as well as the plaintext and ciphertext. Adopting the notion of a single bit leakage as for...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
Abstract. Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), whi...
In this paper, we investigate the security of the NOEKEON block cipher against side channel cube att...
In this paper, we investigate the security of the NOEKEON block cipher against side channel cube att...
The design and analysis of lightweight block ciphers is gaining increasing popularity due to the gen...
NOEKEON is a block cipher having key-size 128 and block size 128,proposed by Daemen, J et al.Shekh F...
Abstract. Side-channel cube attacks are a class of leakage attacks on block ciphers in which the att...
In this paper, we propose an ecient method for extracting simple low-degree equations (e.g. quadrat...
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employe...
In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Ph...
Part 1: Modern CryptographyInternational audienceIn this research, a recently proposed lightweight b...
The cube attack was proposed at the 2009 Eurocrypt. The attack derives linear polynomials for specif...
This paper introduces a new type of cryptanalysis against block ciphers, denoted as algebraic side-c...
Abstract. In 2002, algebraic attacks using overdefined systems of equa-tions have been proposed as a...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
Abstract. Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), whi...
In this paper, we investigate the security of the NOEKEON block cipher against side channel cube att...
In this paper, we investigate the security of the NOEKEON block cipher against side channel cube att...
The design and analysis of lightweight block ciphers is gaining increasing popularity due to the gen...
NOEKEON is a block cipher having key-size 128 and block size 128,proposed by Daemen, J et al.Shekh F...
Abstract. Side-channel cube attacks are a class of leakage attacks on block ciphers in which the att...
In this paper, we propose an ecient method for extracting simple low-degree equations (e.g. quadrat...
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employe...
In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Ph...
Part 1: Modern CryptographyInternational audienceIn this research, a recently proposed lightweight b...
The cube attack was proposed at the 2009 Eurocrypt. The attack derives linear polynomials for specif...
This paper introduces a new type of cryptanalysis against block ciphers, denoted as algebraic side-c...
Abstract. In 2002, algebraic attacks using overdefined systems of equa-tions have been proposed as a...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
Abstract. Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), whi...