In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Phase, where complexity can be calculated without running the actual experiments and random-like search for the cubes. We apply our method to a few different cryptographic algorithms, showing that the method can be used against a wide range of cryptographic primitives, including hash functions and authenticated encryption schemes. We also show that our key-recovery approach could be a framework for side-channel attacks, where the attacker has to deal with random errors in measurements
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
Abstract. A few work has ever been performed in cryptanalysis of block ciphers using cube attacks. T...
In this paper, we propose a new MILP modeling to find better or even optimal choices of conditional ...
Abstract. In this paper, we describe a variant of the cube attack with much better-understood Prepro...
Cube-attack-like cryptanalysis on round-reduced Keccak was proposed by Dinur et al. at EUROCRYPT 201...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
Abstract. Side-channel cube attacks are a class of leakage attacks on block ciphers in which the att...
In cube attacks, key filtering is a basic step of identifying the correct key candidates by referrin...
Abstract. In this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak)...
International audienceIn this paper, we comprehensively study the resistance of keyed variants of SH...
Conditional cube attack is an efficient key-recovery attack on Keccak keyed modes proposed by Huang ...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
In this paper, we propose an ecient method for extracting simple low-degree equations (e.g. quadrat...
The conditional cube attack on round-reduced Keccak keyed modes was proposed by Huang et al. at EURO...
In this paper, we investigate the security of the NOEKEON block cipher against side channel cube att...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
Abstract. A few work has ever been performed in cryptanalysis of block ciphers using cube attacks. T...
In this paper, we propose a new MILP modeling to find better or even optimal choices of conditional ...
Abstract. In this paper, we describe a variant of the cube attack with much better-understood Prepro...
Cube-attack-like cryptanalysis on round-reduced Keccak was proposed by Dinur et al. at EUROCRYPT 201...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
Abstract. Side-channel cube attacks are a class of leakage attacks on block ciphers in which the att...
In cube attacks, key filtering is a basic step of identifying the correct key candidates by referrin...
Abstract. In this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak)...
International audienceIn this paper, we comprehensively study the resistance of keyed variants of SH...
Conditional cube attack is an efficient key-recovery attack on Keccak keyed modes proposed by Huang ...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
In this paper, we propose an ecient method for extracting simple low-degree equations (e.g. quadrat...
The conditional cube attack on round-reduced Keccak keyed modes was proposed by Huang et al. at EURO...
In this paper, we investigate the security of the NOEKEON block cipher against side channel cube att...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
Abstract. A few work has ever been performed in cryptanalysis of block ciphers using cube attacks. T...
In this paper, we propose a new MILP modeling to find better or even optimal choices of conditional ...