In this paper, we propose a new MILP modeling to find better or even optimal choices of conditional cubes, under the general framework of conditional cube attacks. These choices generally find new or improved attacks against the keyed constructions based on Keccak permutation and its variants, including Keccak-MAC, KMAC, Keyak, and Ketje, in terms of attack complexities or the number of attacked rounds. Interestingly, conditional cube attacks were applied to round-reduced Keccak-MAC, but not to KMAC despite the great similarity between Keccak-MAC and KMAC, and the fact that KMAC is the NIST standard way of constructing MAC from SHA-3. As examples to demonstrate the effectiveness of our new modeling, we report key recovery attacks against KM...
In this paper, we give the first pre-image attack against 1- round KECCAK-512 hash function, which w...
In this paper we attack round-reduced Keccak hash function with a technique called rotational crypta...
The Keccak hash function is the winner of the SHA-3 competition and became the SHA-3 standard of NIS...
Conditional cube attack is an efficient key-recovery attack on Keccak keyed modes proposed by Huang ...
The conditional cube attack on round-reduced Keccak keyed modes was proposed by Huang et al. at EURO...
Cube-attack-like cryptanalysis on round-reduced Keccak was proposed by Dinur et al. at EUROCRYPT 201...
International audienceIn this paper, we comprehensively study the resistance of keyed variants of SH...
Abstract. In this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak)...
This paper studies the Keccak-based authenticated encryption (AE) scheme Ketje Sr against cube-like ...
This paper evaluates the security level of the River Keyak against the cube-like attack. River Keyak...
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. As...
On October 2-nd 2012 NIST announced its selection of the Keccak scheme as the new SHA-3 hash standar...
In this paper, we investigate Keccak --- the cryptographic hash function adopted as the SHA-3 standa...
Abstract. In this paper we mount the cube attack on the Keccak sponge function. The cube attack, for...
In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Ph...
In this paper, we give the first pre-image attack against 1- round KECCAK-512 hash function, which w...
In this paper we attack round-reduced Keccak hash function with a technique called rotational crypta...
The Keccak hash function is the winner of the SHA-3 competition and became the SHA-3 standard of NIS...
Conditional cube attack is an efficient key-recovery attack on Keccak keyed modes proposed by Huang ...
The conditional cube attack on round-reduced Keccak keyed modes was proposed by Huang et al. at EURO...
Cube-attack-like cryptanalysis on round-reduced Keccak was proposed by Dinur et al. at EUROCRYPT 201...
International audienceIn this paper, we comprehensively study the resistance of keyed variants of SH...
Abstract. In this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak)...
This paper studies the Keccak-based authenticated encryption (AE) scheme Ketje Sr against cube-like ...
This paper evaluates the security level of the River Keyak against the cube-like attack. River Keyak...
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. As...
On October 2-nd 2012 NIST announced its selection of the Keccak scheme as the new SHA-3 hash standar...
In this paper, we investigate Keccak --- the cryptographic hash function adopted as the SHA-3 standa...
Abstract. In this paper we mount the cube attack on the Keccak sponge function. The cube attack, for...
In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Ph...
In this paper, we give the first pre-image attack against 1- round KECCAK-512 hash function, which w...
In this paper we attack round-reduced Keccak hash function with a technique called rotational crypta...
The Keccak hash function is the winner of the SHA-3 competition and became the SHA-3 standard of NIS...