메뉴 건너뛰기




Volumn 7118 LNCS, Issue , 2012, Pages 200-212

Conditional differential cryptanalysis of trivium and KATAN

Author keywords

conditional differential cryptanalysis; KATAN; Trivium

Indexed keywords

AUTOMATIC TOOLS; DIFFERENTIAL CRYPTANALYSIS; KATAN; KEY-RECOVERY; LIGHTWEIGHT BLOCKS; STREAM CIPHERS; TRIVIUM; WEAK KEY;

EID: 84857711684     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-28496-0_12     Document Type: Conference Paper
Times cited : (56)

References (15)
  • 1
    • 84857758140 scopus 로고    scopus 로고
    • Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64
    • Miri, A., Vaudenay, S. (eds.) SAC 2011. Springer, Heidelberg
    • Ågren, M.: Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 217-233. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7118 , pp. 217-233
    • Ågren, M.1
  • 2
    • 70350385117 scopus 로고    scopus 로고
    • Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
    • Dunkelman, O. (ed.) FSE 2009. Springer, Heidelberg
    • Aumasson, J.-P., Dinur, I., Meier, W., Shamir, A.: Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 1-22. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5665 , pp. 1-22
    • Aumasson, J.-P.1    Dinur, I.2    Meier, W.3    Shamir, A.4
  • 3
    • 84957608539 scopus 로고
    • Differential Cryptanalysis of Lucifer
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
    • Ben-Aroya, I., Biham, E.: Differential Cryptanalysis of Lucifer. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 187-199. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 187-199
    • Ben-Aroya, I.1    Biham, E.2
  • 4
    • 79952610354 scopus 로고    scopus 로고
    • A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
    • Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. Springer, Heidelberg
    • Bogdanov, A., Rechberger, C.: A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol. 6544, pp. 229-240. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6544 , pp. 229-240
    • Bogdanov, A.1    Rechberger, C.2
  • 5
    • 67349265781 scopus 로고    scopus 로고
    • PolyBoRi: A framework for Groebner-basis computations with Boolean polynomials
    • Brickenstein, M., Dreyer, A.: PolyBoRi: A framework for Groebner-basis computations with Boolean polynomials. Journal of Symbolic Computation 44(9), 1326-1345 (2009)
    • (2009) Journal of Symbolic Computation , vol.44 , Issue.9 , pp. 1326-1345
    • Brickenstein, M.1    Dreyer, A.2
  • 6
    • 33750241980 scopus 로고    scopus 로고
    • Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
    • Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. Springer, Heidelberg
    • De Cannière, C.: trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 171-186. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4176 , pp. 171-186
    • De Cannière, C.1
  • 7
    • 70350589237 scopus 로고    scopus 로고
    • KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers
    • Clavier, C., Gaj, K. (eds.) CHES 2009. Springer, Heidelberg
    • De Cannière, C., Dunkelman, O., Kneževič, M.: KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 272-288. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5747 , pp. 272-288
    • De Cannière, C.1    Dunkelman, O.2    Kneževič, M.3
  • 8
    • 67650699727 scopus 로고    scopus 로고
    • Cube Attacks on Tweakable Black Box Polynomials
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Dinur, I., Shamir, A.: Cube Attacks on Tweakable Black Box Polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 278-299. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 278-299
    • Dinur, I.1    Shamir, A.2
  • 9
    • 79959996376 scopus 로고    scopus 로고
    • Breaking Grain-128 with Dynamic Cube Attacks
    • Joux, A. (ed.) FSE 2011. Springer, Heidelberg
    • Dinur, I., Shamir, A.: Breaking Grain-128 with Dynamic Cube Attacks. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 167-187. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6733 , pp. 167-187
    • Dinur, I.1    Shamir, A.2
  • 11
    • 45449101664 scopus 로고    scopus 로고
    • Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
    • Vaudenay, S. (ed.) AFRICACRYPT 2008. Springer, Heidelberg
    • Fischer, S., Khazaei, S., Meier, W.: Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 236-245. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5023 , pp. 236-245
    • Fischer, S.1    Khazaei, S.2    Meier, W.3
  • 12
    • 78650841310 scopus 로고    scopus 로고
    • Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems
    • Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
    • Knellwolf, S., Meier, W., Naya-Plasencia, M.: Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 130-145. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6477 , pp. 130-145
    • Knellwolf, S.1    Meier, W.2    Naya-Plasencia, M.3
  • 13
    • 0041863249 scopus 로고
    • Higher order derivatives and differential cryptanalysis
    • Blahut, R.E., Costello, D.J., Maurer, U., Mittelholzer, T. (eds.) Kluwer Academic Publishers
    • Lai, X.: Higher order derivatives and differential cryptanalysis. In: Blahut, R.E., Costello, D.J., Maurer, U., Mittelholzer, T. (eds.) Communicationis and Cryptography: Two Sides of one Tapestry, pp. 227-233. Kluwer Academic Publishers (1994)
    • (1994) Communicationis and Cryptography: Two Sides of One Tapestry , pp. 227-233
    • Lai, X.1
  • 14
    • 38549124306 scopus 로고    scopus 로고
    • Two Trivial Attacks on Trivium
    • Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. Springer, Heidelberg
    • Maximov, A., Biryukov, A.: Two Trivial Attacks on Trivium. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 36-55. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4876 , pp. 36-55
    • Maximov, A.1    Biryukov, A.2
  • 15
    • 78651077262 scopus 로고    scopus 로고
    • Greedy Distinguishers and Nonrandomness Detectors
    • Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. Springer, Heidelberg
    • Stankovski, P.: Greedy Distinguishers and Nonrandomness Detectors. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol. 6498, pp. 210-226. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6498 , pp. 210-226
    • Stankovski, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.