The cube attack is an algebraic attack that allows an adversary to extract low degree polynomial equations from the targeted cryptographic primitive. This work applies the cube attack to a reduced round version of ACORN, a candidate cipher design in the CAESAR cryptographic competition. The cube attack on 477 initialization rounds of ACORN can recover the 128 bit key with a total attack complexity of about 235. We have also shown that linear equations relating the initial state of the full version of ACORN can be easily generated which can lead to state recovery attack with an attack complexity of about 272.8
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. As...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
At CRYPTO 2017 and IEEE Transactions on Computers in 2018, Todo et al. proposed the division propert...
We investigated the application of cube attacks to MORUS, a candidate in the CAESAR competition. We ...
This paper analyzes the authenticated encryption algorithm ACORN, a candidate in the CAESAR cryptogr...
This paper analyzes the authenticated encryption algorithm ACORN, a candidate in the CAESAR cryptogr...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
Abstract. Dinur and Shamir have described cube attacks at EUROCRYPT ’09 and they have shown how effi...
The cube attack was proposed at the 2009 Eurocrypt. The attack derives linear polynomials for specif...
International audienceAscon is a sponge-based Authenticated Encryption with Associated Data that was...
Free to read on publisher website We investigate six authenticated encryption schemes (ACORN, ASCON-...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to ...
Abstract: Basing on the original Cube attack, this paper proposes an improved method of Cube attack ...
Abstract. Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), whi...
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. As...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
At CRYPTO 2017 and IEEE Transactions on Computers in 2018, Todo et al. proposed the division propert...
We investigated the application of cube attacks to MORUS, a candidate in the CAESAR competition. We ...
This paper analyzes the authenticated encryption algorithm ACORN, a candidate in the CAESAR cryptogr...
This paper analyzes the authenticated encryption algorithm ACORN, a candidate in the CAESAR cryptogr...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
Abstract. Dinur and Shamir have described cube attacks at EUROCRYPT ’09 and they have shown how effi...
The cube attack was proposed at the 2009 Eurocrypt. The attack derives linear polynomials for specif...
International audienceAscon is a sponge-based Authenticated Encryption with Associated Data that was...
Free to read on publisher website We investigate six authenticated encryption schemes (ACORN, ASCON-...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to ...
Abstract: Basing on the original Cube attack, this paper proposes an improved method of Cube attack ...
Abstract. Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), whi...
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. As...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
At CRYPTO 2017 and IEEE Transactions on Computers in 2018, Todo et al. proposed the division propert...