We investigated the application of cube attacks to MORUS, a candidate in the CAESAR competition. We applied the cube attack to a version of MORUS where the initialization phase is reduced from 16 steps to 4. Our analysis shows that the cube attack can successfully recover the secret key of MORUS-640 with a total complexity of about 210 for this reduced version, and similarly for MORUS-1280 with complexity 29. Additionally, we obtained cubes resulting in distinguishers for 5 steps of the initialization of MORUS-1280; these can distinguish the cipher output function from a random function with complexity of 28. All our attacks are verified experimentally. Currently, the cube attack does not threaten the security of MORUS if the full initializ...
Abstract. In this paper, we describe a variant of the cube attack with much better-understood Prepro...
Abstract. Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), whi...
We show that a particular class of stream ciphers - namely those in which the output function contai...
\u3cp\u3eMORUS is a high-performance authenticated encryption algorithm submitted to the CAESAR comp...
The cube attack is an algebraic attack that allows an adversary to extract low degree polynomial equ...
Abstract. Dinur and Shamir have described cube attacks at EUROCRYPT ’09 and they have shown how effi...
Abstract: Basing on the original Cube attack, this paper proposes an improved method of Cube attack ...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
We present several new observations on the CAESAR candidate MORUS (v1). First, we report a collision...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
The cube attack was proposed at the 2009 Eurocrypt. The attack derives linear polynomials for specif...
This paper investigates the application of fault attacks to the authenticated encryption stream ciph...
This paper investigates the application of fault attacks to the authenticated encryption stream ciph...
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. As...
The cube attack is a powerful cryptanalysis technique against symmetric ciphers, especially stream c...
Abstract. In this paper, we describe a variant of the cube attack with much better-understood Prepro...
Abstract. Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), whi...
We show that a particular class of stream ciphers - namely those in which the output function contai...
\u3cp\u3eMORUS is a high-performance authenticated encryption algorithm submitted to the CAESAR comp...
The cube attack is an algebraic attack that allows an adversary to extract low degree polynomial equ...
Abstract. Dinur and Shamir have described cube attacks at EUROCRYPT ’09 and they have shown how effi...
Abstract: Basing on the original Cube attack, this paper proposes an improved method of Cube attack ...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
We present several new observations on the CAESAR candidate MORUS (v1). First, we report a collision...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
The cube attack was proposed at the 2009 Eurocrypt. The attack derives linear polynomials for specif...
This paper investigates the application of fault attacks to the authenticated encryption stream ciph...
This paper investigates the application of fault attacks to the authenticated encryption stream ciph...
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. As...
The cube attack is a powerful cryptanalysis technique against symmetric ciphers, especially stream c...
Abstract. In this paper, we describe a variant of the cube attack with much better-understood Prepro...
Abstract. Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), whi...
We show that a particular class of stream ciphers - namely those in which the output function contai...