메뉴 건너뛰기




Volumn 7092 LNCS, Issue , 2011, Pages 15-25

Cube cryptanalysis of Hitag2 stream cipher

Author keywords

black box and white box attack; cube attack; Hitag2 stream cipher

Indexed keywords

BLACK BOXES; BRUTE FORCE SEARCH; BRUTE-FORCE ATTACK; CAR DOOR; CAR MANUFACTURERS; CUBE ATTACK; INITIALIZATION VECTORS; INTERNAL STATE; KEY BITS; LFSR-BASED STREAM CIPHERS; LINEAR EXPRESSION; LOW DIMENSIONAL; SAT SOLVERS; SECRET KEY; STREAM CIPHERS; THREE PHASIS;

EID: 83755180536     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-25513-7_3     Document Type: Conference Paper
Times cited : (16)

References (22)
  • 1
    • 70350385117 scopus 로고    scopus 로고
    • Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
    • Dunkelman, O. (ed.) FSE 2009. Springer, Heidelberg
    • Aumasson, J.-P., Dinur, I., Meier, W., Shamir, A.: Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 1-22. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5665 , pp. 1-22
    • Aumasson, J.-P.1    Dinur, I.2    Meier, W.3    Shamir, A.4
  • 2
    • 44449137280 scopus 로고    scopus 로고
    • Attacks on the KeeLoq Block Cipher and Authentication System
    • Bogdanov, A.: Attacks on the KeeLoq Block Cipher and Authentication System. In: RFIDSec 2007 (2007)
    • (2007) RFIDSec 2007
    • Bogdanov, A.1
  • 3
    • 83755210767 scopus 로고    scopus 로고
    • Cube Attacks on Trivium
    • ePrint Archive
    • Bedi, S., Pillai, R.: Cube Attacks on Trivium. IACR Cryptology ePrint Archive, 15 (2009)
    • (2009) IACR Cryptology , pp. 15
    • Bedi, S.1    Pillai, R.2
  • 6
    • 50249137714 scopus 로고    scopus 로고
    • Algebraic and Slide Attacks on KeeLoq
    • Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
    • Courtois, N.T., Bard, G.V., Wagner, D.: Algebraic and Slide Attacks on KeeLoq. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 97-115. Springer, Heidelberg (2008), http://eprint.iacr.org/2007/062
    • (2008) LNCS , vol.5086 , pp. 97-115
    • Courtois, N.T.1    Bard, G.V.2    Wagner, D.3
  • 7
    • 35248820612 scopus 로고    scopus 로고
    • Algebraic Attacks on Stream Ciphers with Linear Feedback
    • Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
    • Courtois, N., Meier, W.: Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345-359. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 345-359
    • Courtois, N.1    Meier, W.2
  • 10
    • 70350431832 scopus 로고    scopus 로고
    • Practical Algebraic Attacks on the Hitag2 Stream Cipher
    • Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. Springer, Heidelberg
    • Courtois, N.T., O'Neil, S., Quisquater, J.-J.: Practical Algebraic Attacks on the Hitag2 Stream Cipher. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 167-176. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5735 , pp. 167-176
    • Courtois, N.T.1    O'Neil, S.2    Quisquater, J.-J.3
  • 11
    • 67650699727 scopus 로고    scopus 로고
    • Cube Attacks on Tweakable Black Box Polynomials
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Dinur, I., Shamir, A.: Cube Attacks on Tweakable Black Box Polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 278-299. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 278-299
    • Dinur, I.1    Shamir, A.2
  • 12
    • 52949116081 scopus 로고    scopus 로고
    • A Practical Attack on the MIFARE Classic
    • Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. Springer, Heidelberg
    • de Koning Gans, G., Hoepman, J.-H., Garcia, F.D.: A Practical Attack on the MIFARE Classic. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 267-282. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5189 , pp. 267-282
    • De Koning Gans, G.1    Hoepman, J.-H.2    Garcia, F.D.3
  • 13
    • 57049128814 scopus 로고    scopus 로고
    • Dismantling MIFARE Classic
    • Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
    • Garcia, F.D., de Koning Gans, G., Muijrers, R., van Rossum, P., Verdult, R., Schreur, R.W., Jacobs, B.: Dismantling MIFARE Classic. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 97-114. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 97-114
    • Garcia, F.D.1    De Koning Gans, G.2    Muijrers, R.3    Van Rossum, P.4    Verdult, R.5    Schreur, R.W.6    Jacobs, B.7
  • 18
    • 77954090834 scopus 로고    scopus 로고
    • Chosen-IV statistical attacks on eStream ciphers
    • INSTICC Press
    • Saarinen, M.: Chosen-IV statistical attacks on eStream ciphers. In: SECRYPT 2006, pp. 260-266. INSTICC Press (2006)
    • (2006) SECRYPT 2006 , pp. 260-266
    • Saarinen, M.1
  • 19
    • 48249152755 scopus 로고    scopus 로고
    • Breaking ONE.TRIVIUM by AIDA and Algebraic IV Differential Attack
    • ePrint Archive
    • Vielhaber, M.: Breaking ONE.TRIVIUM by AIDA and Algebraic IV Differential Attack. IACR Cryptology ePrint Archive, 413 (2007)
    • (2007) IACR Cryptology , pp. 413
    • Vielhaber, M.1
  • 20
    • 83755210762 scopus 로고    scopus 로고
    • AIDA Breaks (BIVIUM A and B) in 1 Minute Dual Core CPU Time
    • ePrint Archive
    • Vielhaber, M.: AIDA Breaks (BIVIUM A and B) in 1 Minute Dual Core CPU Time. IACR Cryptology ePrint Archive, 402 (2009)
    • (2009) IACR Cryptology , pp. 402
    • Vielhaber, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.