In this paper, we propose a series of techniques that can be used to determine the missing IV terms of a complex multivariable Boolean polynomial. Using these techniques, we revisit the dynamic cube attack on Grain-128. Based on choosing one more nullified state bit and one more dynamic bit, we are able to obtain the IV terms of degree $43$, combined with various of reduction techniques, fast discarding monomial techniques and IV representation technique for polynomials, so that the missing IV terms can be determined. As a result, we improve the time complexity of the best previous attack on Grain-128 by a factor of $2^{16}$. Moreover, our attack applies to all keys
In cube attacks, key filtering is a basic step of identifying the correct key candidates by referrin...
Abstract: Basing on the original Cube attack, this paper proposes an improved method of Cube attack ...
A major open problem in block cipher cryptanalysis is discovery of new invariant properties of compl...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
Abstract. In this paper we describe the first single-key attack which can recover the full key of th...
In this paper, we improve the cube attack by exploiting low-degree factors of the superpoly w.r.t. c...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
Abstract. Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), whi...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
Cube attack is one powerful method in the cryptanalysis of NFSR-based ciphers. In this paper, we pro...
Abstract. In this work, we describe the first single-key attack on the full version of Grain-128 tha...
Cube attacks exploit the algebraic properties of symmetric ciphers by recovering a special polynomia...
Based on the Cube Attack by Itai Dinur and Adi Shamir and another, in the essence simi- lar, method ...
International audienceDinur and Shamir have described cube attacks at EUROCRYPT '09 and they have sh...
In cube attacks, key filtering is a basic step of identifying the correct key candidates by referrin...
Abstract: Basing on the original Cube attack, this paper proposes an improved method of Cube attack ...
A major open problem in block cipher cryptanalysis is discovery of new invariant properties of compl...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
Abstract. In this paper we describe the first single-key attack which can recover the full key of th...
In this paper, we improve the cube attack by exploiting low-degree factors of the superpoly w.r.t. c...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
Abstract. Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), whi...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
Cube attack is one powerful method in the cryptanalysis of NFSR-based ciphers. In this paper, we pro...
Abstract. In this work, we describe the first single-key attack on the full version of Grain-128 tha...
Cube attacks exploit the algebraic properties of symmetric ciphers by recovering a special polynomia...
Based on the Cube Attack by Itai Dinur and Adi Shamir and another, in the essence simi- lar, method ...
International audienceDinur and Shamir have described cube attacks at EUROCRYPT '09 and they have sh...
In cube attacks, key filtering is a basic step of identifying the correct key candidates by referrin...
Abstract: Basing on the original Cube attack, this paper proposes an improved method of Cube attack ...
A major open problem in block cipher cryptanalysis is discovery of new invariant properties of compl...