메뉴 건너뛰기




Volumn 5665 LNCS, Issue , 2009, Pages 1-22

Cube testers and key recovery attacks on reduced-round MD6 and trivium

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRAIC ATTACK; ALGEBRAIC NORMAL FORMS; COMPRESSION FUNCTIONS; CRYPTOGRAPHIC FUNCTIONS; CRYPTOGRAPHIC SCHEMES; DISTINGUISHERS; KEY RECOVERY ATTACKS; NON-RANDOMNESS; PROPERTY-TESTING; STREAM CIPHERS;

EID: 70350385117     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03317-9_1     Document Type: Conference Paper
Times cited : (133)

References (32)
  • 1
    • 35248821354 scopus 로고    scopus 로고
    • Testing low-degree polynomials over GF
    • Arora, S, Jansen, K, Rolim, J.D.P, Sahai, A, eds, RANDOM 2003 and APPROX 2003, Springer, Heidelberg
    • Alon, N., Kaufman, T., Krivelevich, M., Litsyn, S., Ron, D.: Testing low-degree polynomials over GF(2). In: Arora, S., Jansen, K., Rolim, J.D.P., Sahai, A. (eds.) RANDOM 2003 and APPROX 2003. LNCS, vol. 2764, pp. 188-199. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2764 , pp. 188-199
    • Alon, N.1    Kaufman, T.2    Krivelevich, M.3    Litsyn, S.4    Ron, D.5
  • 2
    • 38149004458 scopus 로고    scopus 로고
    • Analysis of multivariate hash functions
    • Nam, K.-H, Rhee, G, eds, ICISC 2007, Springer, Heidelberg
    • Aumasson, J.-P., Meier, W.: Analysis of multivariate hash functions. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 309-323. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4817 , pp. 309-323
    • Aumasson, J.-P.1    Meier, W.2
  • 4
    • 38149109062 scopus 로고    scopus 로고
    • Billet, O., Robshaw, M.J.B., Peyrin, T.: On building hash functions from multivariate quadratic equations. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, 4586, pp. 82-95. Springer, Heidelberg (2007)
    • Billet, O., Robshaw, M.J.B., Peyrin, T.: On building hash functions from multivariate quadratic equations. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 82-95. Springer, Heidelberg (2007)
  • 5
    • 0025022876 scopus 로고    scopus 로고
    • Blum, M., Luby, M., Rubinfeld, R.: Self-testing/correcting with applications to numerical problems. In: STOC., pp. 73-83. ACM, New York (1990)
    • Blum, M., Luby, M., Rubinfeld, R.: Self-testing/correcting with applications to numerical problems. In: STOC., pp. 73-83. ACM, New York (1990)
  • 6
    • 48249107069 scopus 로고    scopus 로고
    • De Cannière, C., Preneel, B.: Trivium. In: Robshaw, M.J.B., Billet, O. (eds.) New Stream Cipher Designs. LNCS, 4986, pp. 244-266. Springer, Heidelberg (2008)
    • De Cannière, C., Preneel, B.: Trivium. In: Robshaw, M.J.B., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 244-266. Springer, Heidelberg (2008)
  • 8
    • 58549091557 scopus 로고    scopus 로고
    • Cube attacks on tweakable black box polynomials. IACR ePrint Archive
    • Report 2008/385, version 20080914:160327
    • Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. IACR ePrint Archive, Report 2008/385, version 20080914:160327 (2008), http://eprint.iacr.org/2008/385
    • (2008)
    • Dinur, I.1    Shamir, A.2
  • 9
    • 67650699727 scopus 로고    scopus 로고
    • Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, 5479, pp. 278-299. Springer, Heidelberg (2009); see also [8]
    • Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 278-299. Springer, Heidelberg (2009); see also [8]
  • 10
    • 38349025631 scopus 로고    scopus 로고
    • A framework for chosen IV statistical analysis of stream ciphers
    • Srinathan, K, Rangan, C.P, Yung, M, eds, INDOCRYPT 2007, Springer, Heidelberg
    • Englund, H., Johansson, T., Turan, M.S.: A framework for chosen IV statistical analysis of stream ciphers. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 268-281. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4859 , pp. 268-281
    • Englund, H.1    Johansson, T.2    Turan, M.S.3
  • 11
    • 84944068664 scopus 로고    scopus 로고
    • A new statistical testing for symmetric ciphers and hash functions
    • Deng, R.H, Qing, S, Bao, F, Zhou, J, eds, ICICS 2002, Springer, Heidelberg
    • Filiol, E.: A new statistical testing for symmetric ciphers and hash functions. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 342-353. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2513 , pp. 342-353
    • Filiol, E.1
  • 12
    • 45449101664 scopus 로고    scopus 로고
    • Chosen IV statistical analysis for key recovery attacks on stream ciphers
    • Vaudenay, S, ed, AFRICACRYPT 2008, Springer, Heidelberg
    • Fischer, S., Khazaei, S., Meier, W.: Chosen IV statistical analysis for key recovery attacks on stream ciphers. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 236-245. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5023 , pp. 236-245
    • Fischer, S.1    Khazaei, S.2    Meier, W.3
  • 13
    • 17744373121 scopus 로고    scopus 로고
    • Testing polynomials over general fields. In: FOCS
    • Los Alamitos
    • Kaufman, T., Ron, D.: Testing polynomials over general fields. In: FOCS, pp. 413-422. IEEE Computer Society, Los Alamitos (2004)
    • (2004) IEEE Computer Society , pp. 413-422
    • Kaufman, T.1    Ron, D.2
  • 14
    • 57049100995 scopus 로고    scopus 로고
    • Kaufman, T., Sudan, M.: Algebraic property testing: the role of invariance. In: Ladner, R.E., Dwork, C. (eds.) STOC., pp. 403-412. ACM, New York (2008)
    • Kaufman, T., Sudan, M.: Algebraic property testing: the role of invariance. In: Ladner, R.E., Dwork, C. (eds.) STOC., pp. 403-412. ACM, New York (2008)
  • 15
    • 58549086616 scopus 로고    scopus 로고
    • New directions in cryptanalysis of self-synchronizing stream ciphers
    • Chowdhury, D.R, Rijmen, V, Das, A, eds, INDOCRYPT 2008, Springer, Heidelberg
    • Khazaei, S., Meier, W.: New directions in cryptanalysis of self-synchronizing stream ciphers. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 15-26. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5365 , pp. 15-26
    • Khazaei, S.1    Meier, W.2
  • 16
    • 84948949623 scopus 로고    scopus 로고
    • Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, 1008, pp. 196-211. Springer, Heidelberg (1995)
    • Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 196-211. Springer, Heidelberg (1995)
  • 17
    • 70350403182 scopus 로고    scopus 로고
    • Lucks, S.: The saturation attack - a bait for Twofish. In: Matsui, M. (ed.) FSE 2001. LNCS, 2355, pp. 1-15. Springer, Heidelberg (2001)
    • Lucks, S.: The saturation attack - a bait for Twofish. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 1-15. Springer, Heidelberg (2001)
  • 19
    • 38549124306 scopus 로고    scopus 로고
    • Maximov, A., Biryukov, A.: Two trivial attacks on Trivium. In: Adams, C.M., Miri, A., Wiener, M.J. (eds.) SAC 2007. LNCS, 4876, pp. 36-55. Springer, Heidelberg (2007)
    • Maximov, A., Biryukov, A.: Two trivial attacks on Trivium. In: Adams, C.M., Miri, A., Wiener, M.J. (eds.) SAC 2007. LNCS, vol. 4876, pp. 36-55. Springer, Heidelberg (2007)
  • 20
    • 38149055134 scopus 로고    scopus 로고
    • Attacking Bivium with MiniSat. eS-TREAM
    • ECRYPT Stream Cipher Project, Report 2007/040
    • McDonald, C., Charnes, C., Pieprzyk, J.: Attacking Bivium with MiniSat. eS-TREAM, ECRYPT Stream Cipher Project, Report 2007/040 (2007)
    • (2007)
    • McDonald, C.1    Charnes, C.2    Pieprzyk, J.3
  • 21
    • 67650699139 scopus 로고    scopus 로고
    • Algebraic structure defectoscopy. IACR ePrint Archive
    • Report 2007/378
    • O'Neil, S.: Algebraic structure defectoscopy. IACR ePrint Archive, Report 2007/378 (2007), http://eprint.iacr.org/2007/378
    • (2007)
    • O'Neil, S.1
  • 22
    • 70350372731 scopus 로고    scopus 로고
    • Transforming chosen iv attack into a key differential attack: How to break TRIVIUM and similar designs. IACR ePrint Archive
    • Report 2008/443
    • Pasalic, E.: Transforming chosen iv attack into a key differential attack: how to break TRIVIUM and similar designs. IACR ePrint Archive, Report 2008/443 (2008), http://eprint.iacr.org/2008/443
    • (2008)
    • Pasalic, E.1
  • 23
    • 57049177122 scopus 로고    scopus 로고
    • Cryptanalytic results on Trivium. eSTREAM
    • ECRYPT Stream Cipher Project, Report 2005/001
    • Raddum, H.: Cryptanalytic results on Trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/001 (2006)
    • (2006)
    • Raddum, H.1
  • 24
    • 70350372733 scopus 로고    scopus 로고
    • The MD6 hash function
    • Rivest, R.L.: The MD6 hash function. Invited talk at CRYPTO 2008 (2008), http://people.csail.mit.edu/rivest/
    • (2008) Invited talk at CRYPTO
    • Rivest, R.L.1
  • 26
    • 0030128622 scopus 로고    scopus 로고
    • Robust characterizations of polynomials with applications to program testing
    • Rubinfeld, R., Sudan, M.: Robust characterizations of polynomials with applications to program testing. SIAM J. Comput. 25(2), 252-271 (1996)
    • (1996) SIAM J. Comput , vol.25 , Issue.2 , pp. 252-271
    • Rubinfeld, R.1    Sudan, M.2
  • 27
    • 77954090834 scopus 로고    scopus 로고
    • Saarinen, M.-J.O.: Chosen-IV statistical attacks on eStream ciphers. In: Malek, M., Fernández-Medina, E., Hernando, J. (eds.) SECRYPT, pp. 260-266. INSTICC Press (2006)
    • Saarinen, M.-J.O.: Chosen-IV statistical attacks on eStream ciphers. In: Malek, M., Fernández-Medina, E., Hernando, J. (eds.) SECRYPT, pp. 260-266. INSTICC Press (2006)
  • 28
    • 35448956815 scopus 로고    scopus 로고
    • Samorodnitsky, A.: Low-degree tests at large distances. In: Johnson, D.S., Feige, U. (eds.) STOC., pp. 506-515. ACM, New York (2007)
    • Samorodnitsky, A.: Low-degree tests at large distances. In: Johnson, D.S., Feige, U. (eds.) STOC., pp. 506-515. ACM, New York (2007)
  • 29
    • 70350404093 scopus 로고    scopus 로고
    • How to solve it: New techniques in algebraic cryptanalysis
    • Shamir, A.: How to solve it: New techniques in algebraic cryptanalysis. Invited talk at CRYPTO 2008 (2008)
    • (2008) Invited talk at CRYPTO
    • Shamir, A.1
  • 30
    • 84878102737 scopus 로고    scopus 로고
    • The dichotomy between structure and randomness, arithmetic progressions, and the primes
    • European Mathematical Society
    • Tao, T.: The dichotomy between structure and randomness, arithmetic progressions, and the primes. In: International Congress of Mathematicians, pp. 581-608. European Mathematical Society (2006)
    • (2006) International Congress of Mathematicians , pp. 581-608
    • Tao, T.1
  • 31
    • 48249097255 scopus 로고    scopus 로고
    • Linear approximations for 2-round Trivium. eSTREAM
    • ECRYPT Stream Cipher Project, Report 2007/008
    • Turan, M.S., Kara, O.: Linear approximations for 2-round Trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/008 (2007)
    • (2007)
    • Turan, M.S.1    Kara, O.2
  • 32
    • 70350421152 scopus 로고    scopus 로고
    • Vielhaber, M.: Breaking ONE.FIVIUM by AIDA an algebraic IV differential attack. IACR ePrint Archive, Report 2007/413 (2007), http://eprint.iacr.org/ 2007/413
    • Vielhaber, M.: Breaking ONE.FIVIUM by AIDA an algebraic IV differential attack. IACR ePrint Archive, Report 2007/413 (2007), http://eprint.iacr.org/ 2007/413


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.