Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,168,521 papers from all fields of science
Search
Sign In
Create Free Account
Cube attack
Known as:
Cube (disambiguation)
The cube attack is a method of cryptanalysis applicable to a wide variety of symmetric-key algorithms, published by Itai Dinur and Adi Shamir in a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Cryptanalysis
Degree of a polynomial
Higher-order differential cryptanalysis
Polynomial
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm
F. Liu
IACR Cryptology ePrint Archive
2019
Corpus ID: 52160782
In this paper, we introduce an alternative method to find ordinary cube variables for Keccak-MAC by making full use of the key…
Expand
2018
2018
Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18
Yonglin Hao
,
Lin Jiao
,
Chaoyun Li
,
W. Meier
,
Yosuke Todo
,
Qingju Wang
IACR Cryptology ePrint Archive
2018
Corpus ID: 53240227
Recently, another kind of dynamic cube attack is proposed by Fu et al.. With some key guesses and a transformation in the output…
Expand
2017
2017
The Cube Attack on Courtois Toy Cipher
J. Szmidt
International Conference on Number-Theoretic…
2017
Corpus ID: 3813335
The cube attack has been introduced by Dinur and Shamir [8] as a known plaintext attack on symmetric primitives. The attack has…
Expand
2014
2014
Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function
Itai Dinur
,
P. Morawiecki
,
J. Pieprzyk
,
M. Srebrny
,
Michal Straus
IACR Cryptology ePrint Archive
2014
Corpus ID: 2024695
In this paper we mount the cube attack on the Keccak sponge function. The cube attack, formally introduced in 2008, is an…
Expand
2014
2014
Cube and dynamic cube attacks on SIMON32/64
Reyhaneh Rabaninejad
,
Z. Ahmadian
,
M. Salmasizadeh
,
M. Aref
11th International ISC Conference on Information…
2014
Corpus ID: 10894870
This paper presents cube and dynamic cube attacks on reduced-round lightweihgt block cipher SIMON32/64, proposed by U.S. National…
Expand
2014
2014
A Dynamic Cube Attack on 105 round Grain v1
S. Banik
IACR Cryptology ePrint Archive
2014
Corpus ID: 8177027
As far as the Differential Cryptanalysis of reduced round Grain v1 is concerned, the best results were those published by…
Expand
2013
2013
The Improved Cube Attack on Grain-v1
Yongjuan Wang
,
Liren Ding
,
Wenbao Han
,
Xiangyu Wang
IACR Cryptology ePrint Archive
2013
Corpus ID: 13958838
The crucial problem of cube attack is the selection of cube set, which also being the most time-consuming process. This paper…
Expand
2011
2011
Another View on Cube Attack , Cube Tester , AIDA and Higher Order Differential Cryptanalysis
Bo Zhu
,
G. Gong
,
Xuejia Lai
,
Kefei Chen
2011
Corpus ID: 17034468
This paper introduces a more in-depth cryptanalysis framework for tweakable cryptosystems than Cube Attack, Cube Tester…
Expand
2011
2011
Cube Cryptanalysis of Hitag2 Stream Cipher
Siwei Sun
,
Lei Hu
,
Yonghong Xie
,
Xiangyong Zeng
Cryptology and Network Security
2011
Corpus ID: 40274443
Hitag2 is a lightweight LFSR-based stream cipher with a 48-bit key and a 48-bit internal state. As a more secure version of the…
Expand
2009
2009
Cube Attacks on Trivium
S. Bedi
,
N. R. Pillai
IACR Cryptology ePrint Archive
2009
Corpus ID: 19558296
This paper discusses the Cube attacks proposed in [3] and [5] applied to Trivium variants. Independent verification of the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE