International audienceThe cube attack is a powerful cryptanalysis technique against symmetric primitives, especially for stream ciphers. One of the key step in a cube attack is recovering the superpoly. The division property has been introduced to cube attacks with the aim first to identify variables/monomials that are not involved in the superpoly. Recently, some improved versions of this technique allowing the recovery of the exact superpoly have been developed and applied on various stream ciphers [13,15]. In this paper, we propose a new model to recover the exact superpoly of a stream cipher given a cube. We model the polynomials involved in the stream cipher as a directed graph. It happens that this structure handles some of the monomi...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
The cube attack is one of the most important cryptanalytic techniques against Trivium. Many improvem...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
International audienceThe cube attack is a powerful cryptanalysis technique against symmetric primit...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
Cube attack is one powerful method in the cryptanalysis of NFSR-based ciphers. In this paper, we pro...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
Cube attacks exploit the algebraic properties of symmetric ciphers by recovering a special polynomia...
Abstract. Dinur and Shamir have described cube attacks at EUROCRYPT ’09 and they have shown how effi...
In this paper, we improve the cube attack by exploiting low-degree factors of the superpoly w.r.t. c...
The cube attack is a powerful cryptanalysis technique against symmetric ciphers, especially stream c...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
Cube attack was proposed by Dinur and Shamir, and it has become an important tool for analyzing stre...
In cube attacks, key filtering is a basic step of identifying the correct key candidates by referrin...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
The cube attack is one of the most important cryptanalytic techniques against Trivium. Many improvem...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
International audienceThe cube attack is a powerful cryptanalysis technique against symmetric primit...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
Cube attack is one powerful method in the cryptanalysis of NFSR-based ciphers. In this paper, we pro...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
Cube attacks exploit the algebraic properties of symmetric ciphers by recovering a special polynomia...
Abstract. Dinur and Shamir have described cube attacks at EUROCRYPT ’09 and they have shown how effi...
In this paper, we improve the cube attack by exploiting low-degree factors of the superpoly w.r.t. c...
The cube attack is a powerful cryptanalysis technique against symmetric ciphers, especially stream c...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
Cube attack was proposed by Dinur and Shamir, and it has become an important tool for analyzing stre...
In cube attacks, key filtering is a basic step of identifying the correct key candidates by referrin...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
The cube attack is one of the most important cryptanalytic techniques against Trivium. Many improvem...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...