ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A New Cube Attack on MORUS by Using Division Property
IEEE Transactions on Computers
◽
10.1109/tc.2019.2929137
◽
2019
◽
Vol 68
(12)
◽
pp. 1731-1740
Author(s):
Tao Ye
◽
Yongzhuang Wei
◽
Willi Meier
Keyword(s):
Cube Attack
Download Full-text
Related Documents
Cited By
References
Cube Attack on Grain
Journal of Software
◽
10.3724/sp.j.1001.2012.03983
◽
2012
◽
Vol 23
(1)
◽
pp. 171-176
Author(s):
Hai-Xin SONG
◽
Xiu-Bin FAN
◽
Chuan-Kun WU
◽
Deng-Guo FENG
Keyword(s):
Cube Attack
Download Full-text
Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes
Science China Information Sciences
◽
10.1007/s11432-018-9798-8
◽
2021
◽
Vol 64
(3)
◽
Author(s):
Lingyue Qin
◽
Xiaoyang Dong
◽
Keting Jia
◽
Rui Zong
Keyword(s):
Cube Attack
Download Full-text
Higher order differentiation over finite fields with applications to generalising the cube attack
Designs Codes and Cryptography
◽
10.1007/s10623-016-0277-5
◽
2016
◽
Vol 84
(3)
◽
pp. 425-449
◽
Cited By ~ 1
Author(s):
Ana Sălăgean
◽
R. Winter
◽
Matei Mandache-Sălăgean
◽
Raphael C.-W. Phan
Keyword(s):
Finite Fields
◽
Higher Order
◽
Cube Attack
Download Full-text
On the Security of LBlock against the Cube Attack and Side Channel Cube Attack
Security Engineering and Intelligence Informatics - Lecture Notes in Computer Science
◽
10.1007/978-3-642-40588-4_8
◽
2013
◽
pp. 105-121
◽
Cited By ~ 4
Author(s):
Saad Islam
◽
Mehreen Afzal
◽
Adnan Rashdi
Keyword(s):
Side Channel
◽
Cube Attack
Download Full-text
The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
Fundamenta Informaticae
◽
10.3233/fi-2012-631
◽
2012
◽
Vol 114
(3-4)
◽
pp. 309-318
◽
Cited By ~ 10
Author(s):
Piotr Mroczkowski
◽
Janusz Szmidt
Keyword(s):
Stream Cipher
◽
Cube Attack
Download Full-text
A Novel GPU-Based Implementation of the Cube Attack
Applied Cryptography and Network Security - Lecture Notes in Computer Science
◽
10.1007/978-3-319-61204-1_10
◽
2017
◽
pp. 184-207
◽
Cited By ~ 3
Author(s):
Marco Cianfriglia
◽
Stefano Guarino
◽
Massimo Bernaschi
◽
Flavio Lombardi
◽
Marco Pedicini
Keyword(s):
Cube Attack
Download Full-text
MILP-Based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher
Cryptography and Coding - Lecture Notes in Computer Science
◽
10.1007/978-3-319-71045-7_17
◽
2017
◽
pp. 333-351
Author(s):
Raghvendra Rohit
◽
Riham AlTawy
◽
Guang Gong
Keyword(s):
Stream Cipher
◽
Cube Attack
Download Full-text
Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search
Journal of Cryptographic Engineering
◽
10.1007/s13389-019-00217-3
◽
2019
◽
Vol 9
(4)
◽
pp. 375-392
Author(s):
Marco Cianfriglia
◽
Stefano Guarino
◽
Massimo Bernaschi
◽
Flavio Lombardi
◽
Marco Pedicini
Keyword(s):
Cube Attack
Download Full-text
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
Advances in Cryptology -- EUROCRYPT 2015 - Lecture Notes in Computer Science
◽
10.1007/978-3-662-46800-5_28
◽
2015
◽
pp. 733-761
◽
Cited By ~ 33
Author(s):
Itai Dinur
◽
Paweł Morawiecki
◽
Josef Pieprzyk
◽
Marian Srebrny
◽
Michał Straus
Keyword(s):
Cube Attack
◽
Cube Attacks
Download Full-text
Theoretical Security Evaluation Against Side-Channel Cube Attack with Key Enumeration
Progress in Cryptology – LATINCRYPT 2017 - Lecture Notes in Computer Science
◽
10.1007/978-3-030-25283-0_8
◽
2019
◽
pp. 145-165
Author(s):
Haruhisa Kosuge
◽
Hidema Tanaka
Keyword(s):
Security Evaluation
◽
Side Channel
◽
Cube Attack
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close