We generalise the cube attack of Dinur and Shamir (and the similar AIDA attack of Vielhaber) to a more general higher order differentiation attack, by summing over an arbitrary subspace of the space of initialisation vectors. The Moebius transform can be used for efficiently examining all the subspaces of a big space, similar to the method used by Fouque and Vannet for the usual cube attack. Secondly we propose replacing the Generalised Linearity Test proposed by Dinur and Shamir with a test based on higher order differentiation/ Moebius transform. We show that the proposed test provides all the information provided by the Generalised Linearity Test, at the same computational cost. In addition, for functions that do not pas...
We investigated the application of cube attacks to MORUS, a candidate in the CAESAR competition. We ...
We present in full details a version of the Dinur-Shamir Cube Attack (Dinur & Shamir 2009) for a...
Basing on the original Cube attack, this paper proposes an improved method of Cube attack on stream ...
We generalise the cube attack of Dinur and Shamir (and the similar AIDA attack of Vielhaber) to a mo...
Based on the Cube Attack by Itai Dinur and Adi Shamir and another, in the essence simi- lar, method ...
International audienceDinur and Shamir have described cube attacks at EUROCRYPT '09 and they have sh...
At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to ...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
Abstract: Basing on the original Cube attack, this paper proposes an improved method of Cube attack ...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
Higher order differentiation was introduced in a cryptographic context by Lai. Several attacks can b...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
Cube attack is one powerful method in the cryptanalysis of NFSR-based ciphers. In this paper, we pro...
We investigated the application of cube attacks to MORUS, a candidate in the CAESAR competition. We ...
We present in full details a version of the Dinur-Shamir Cube Attack (Dinur & Shamir 2009) for a...
Basing on the original Cube attack, this paper proposes an improved method of Cube attack on stream ...
We generalise the cube attack of Dinur and Shamir (and the similar AIDA attack of Vielhaber) to a mo...
Based on the Cube Attack by Itai Dinur and Adi Shamir and another, in the essence simi- lar, method ...
International audienceDinur and Shamir have described cube attacks at EUROCRYPT '09 and they have sh...
At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to ...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
Abstract: Basing on the original Cube attack, this paper proposes an improved method of Cube attack ...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
Higher order differentiation was introduced in a cryptographic context by Lai. Several attacks can b...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
Cube attack is one powerful method in the cryptanalysis of NFSR-based ciphers. In this paper, we pro...
We investigated the application of cube attacks to MORUS, a candidate in the CAESAR competition. We ...
We present in full details a version of the Dinur-Shamir Cube Attack (Dinur & Shamir 2009) for a...
Basing on the original Cube attack, this paper proposes an improved method of Cube attack on stream ...