The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciphers. Since we need to analyze the complicated structure of a stream cipher in the cube attack, the cube attack basically analyzes it by regarding it as a blackbox. Therefore, the cube attack is an experimental attack, and we cannot evaluate the security when the size of cube exceeds an experimental range, e.g., 40. In this paper, we propose cube attacks on non-blackbox polynomials. Our attacks are developed by using the division property, which is recently applied to various block ciphers. The clear advantage is that we can exploit large cube sizes because it never regards the cipher as a blackbox. We apply the new cube attack to Trivium, Gra...
Abstract. Dinur and Shamir have described cube attacks at EUROCRYPT ’09 and they have shown how effi...
The cube attack is one of the most important cryptanalytic techniques against Trivium. Many improvem...
In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Ph...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
Abstract. Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), whi...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
In cube attacks, key filtering is a basic step of identifying the correct key candidates by referrin...
The cube attack is a powerful cryptanalysis technique against symmetric ciphers, especially stream c...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
The cube attack was proposed at the 2009 Eurocrypt. The attack derives linear polynomials for specif...
International audienceThe cube attack is a powerful cryptanalysis technique against symmetric primit...
Cube attack is one powerful method in the cryptanalysis of NFSR-based ciphers. In this paper, we pro...
Cube attacks exploit the algebraic properties of symmetric ciphers by recovering a special polynomia...
Abstract. Dinur and Shamir have described cube attacks at EUROCRYPT ’09 and they have shown how effi...
The cube attack is one of the most important cryptanalytic techniques against Trivium. Many improvem...
In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Ph...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
Abstract. Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), whi...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
In cube attacks, key filtering is a basic step of identifying the correct key candidates by referrin...
The cube attack is a powerful cryptanalysis technique against symmetric ciphers, especially stream c...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
The cube attack was proposed at the 2009 Eurocrypt. The attack derives linear polynomials for specif...
International audienceThe cube attack is a powerful cryptanalysis technique against symmetric primit...
Cube attack is one powerful method in the cryptanalysis of NFSR-based ciphers. In this paper, we pro...
Cube attacks exploit the algebraic properties of symmetric ciphers by recovering a special polynomia...
Abstract. Dinur and Shamir have described cube attacks at EUROCRYPT ’09 and they have shown how effi...
The cube attack is one of the most important cryptanalytic techniques against Trivium. Many improvem...
In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Ph...