We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 447 results
  1. An Image Encryption Algorithm Based on Trivium Cipher and Random Substitution

    Traditional encryption algorithms are not suitable and computationally efficient for encrypting multimedia data due to the large size and high...

    Yousef Alghamdi, Arslan Munir in SN Computer Science
    Article 20 September 2023
  2. Higher-Order Masking Scheme for Trivium Hardware Implementation

    Trivium as a representative stream cipher has been adopted by ISO/IEC in 2012. It can be foreseen that Trivium will be widely used to achieve the...
    Bohan Li, Hailong Zhang, Dongdai Lin in Information Security and Cryptology
    Conference paper 2023
  3. An Experimentally Verified Attack on 820-Round Trivium

    The cube attack is one of the most important cryptanalytic techniques against Trivium. As the method of recovering superpolies becomes more and more...
    Cheng Che, Tian Tian in Information Security and Cryptology
    Conference paper 2023
  4. Improved Graph-Based Model for Recovering Superpoly on Trivium

    Recovering superpoly for a given cube is the key step in cube attacks - an algebraic cryptanalysis method for symmetric ciphers. Since 2015, division...
    Junjie Cheng, Kexin Qiao in Topics in Cryptology – CT-RSA 2023
    Conference paper 2023
  5. More Balanced Polynomials: Cube Attacks on 810- And 825-Round Trivium with Practical Complexities

    The key step of the cube attack is to recover the special polynomial, the superpoly, of the target cipher. In particular, the balanced superpoly, in...
    Hao Lei, Jiahui He, ... Meiqin Wang in Selected Areas in Cryptography – SAC 2023
    Conference paper 2024
  6. The MILP-aided conditional differential attack and its application to Trivium

    Conditional differential attacks were proposed by Knellwolf et al. at ASIACRYPT 2010 which targeted at cryptographic primitives based on non-linear...

    Chen-Dong Ye, Tian Tian, Fan-Yang Zeng in Designs, Codes and Cryptography
    Article 23 November 2020
  7. A Practical Key-Recovery Attack on 805-Round Trivium

    The cube attack is one of the most important cryptanalytic techniques against Trivium. Many key-recovery attacks based on cube attacks have been...
    Chen-Dong Ye, Tian Tian in Advances in Cryptology – ASIACRYPT 2021
    Conference paper 2021
  8. A Simpler Model for Recovering Superpoly on Trivium

    The cube attack is a powerful cryptanalysis technique against symmetric primitives, especially for stream ciphers. One of the key step in a cube...
    Stéphanie Delaune, Patrick Derbez, ... Charles Prud’homme in Selected Areas in Cryptography
    Conference paper 2022
  9. PENTAVIUM: Potent Trivium-Like Stream Cipher Using Higher Radii Cellular Automata

    Cellular Automata (CA) have recently evolved as a good cryptographic primitive. CA have been used as pseudorandom number generators in stream...
    Anita John, B. C. Nandu, ... Jimmy Jose in Cellular Automata
    Conference paper 2021
  10. Nacc-Guard: a lightweight DNN accelerator architecture for secure deep learning

    Recent breakthroughs in artificial intelligence and deep neural networks (DNNs) have produced an explosive demand for computing platforms equipped...

    Peng Li, Cheng Che, Rui Hou in The Journal of Supercomputing
    Article 07 October 2023
  11. A New Correlation Cube Attack Based on Division Property

    Correlation cube attacks were proposed by Liu et al. at EUROCRYPT 2018, which targeted a modern symmetric-key cryptosystem based on nonlinear...
    Cheng Che, Tian Tian in Information Security and Privacy
    Conference paper 2023
  12. GL-S-NFSR: A new NFSR structure and its period properties

    Recently nonlinear feedback shift registers (NFSRs) have frequently been used as basic building blocks for stream ciphers. A major problem concerning...

    **ao-Juan Wang, Tian Tian, Wen-Feng Qi in Cryptography and Communications
    Article 17 January 2024
  13. Massive Superpoly Recovery with a Meet-in-the-Middle Framework

    The cube attack extracts the information of secret key bits by recovering the coefficient called superpoly in the output bit with respect to a subset...
    Jiahui He, Kai Hu, ... Meiqin Wang in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  14. New General Framework for Algebraic Degree Evaluation of NFSR-Based Cryptosystems

    At CRYPTO 2017, Liu presented a general framework of iterative estimation of algebraic degree for NFSR-based cryptosystems, by exploiting a...
    Conference paper 2022
  15. Key Filtering in Cube Attacks from the Implementation Aspect

    In cube attacks, key filtering is a basic step of identifying the correct key candidates by referring to the truth tables of superpolies. When terms...
    Hao Fan, Yonglin Hao, ... Lin Jiao in Cryptology and Network Security
    Conference paper 2023
  16. Correlation Cube Attack Revisited

    In this paper, we improve the cube attack by exploiting low-degree factors of the superpoly w.r.t. certain “special” index set of cube (ISoC). This...
    Jianhua Wang, Lu Qin, Baofeng Wu in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  17. An improved degree evaluation method of NFSR-based cryptosystems

    In this paper, we study the algebraic degree evaluation of NFSR-based cryptosystems. The degree evaluation method based on the numeric map**...

    Chen-Dong Ye, Tian Tian in Designs, Codes and Cryptography
    Article 20 October 2021
  18. Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies

    Cube attacks exploit the algebraic properties of symmetric ciphers by recovering a special polynomial, the superpoly, and subsequently the secret...
    Jiahui He, Kai Hu, ... Meiqin Wang in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  19. Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware

    FrodoKEM is a lattice-based key encapsulation mechanism, currently a semi-finalist in NIST’s post-quantum standardisation effort. A condition for...

    James Howe, Marco Martinoli, ... Francesco Regazzoni in Journal of Cryptographic Engineering
    Article Open access 20 March 2021
  20. From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers

    Low energy is an important aspect of hardware implementation. For energy-limited battery-powered devices, low energy stream ciphers can play an...
    Jikang Lin, Jiahui He, ... Meiqin Wang in Progress in Cryptology - AFRICACRYPT 2023
    Conference paper 2023
Did you find what you were looking for? Share feedback.