Search
Search Results
-
An Image Encryption Algorithm Based on Trivium Cipher and Random Substitution
Traditional encryption algorithms are not suitable and computationally efficient for encrypting multimedia data due to the large size and high...
-
Higher-Order Masking Scheme for Trivium Hardware Implementation
Trivium as a representative stream cipher has been adopted by ISO/IEC in 2012. It can be foreseen that Trivium will be widely used to achieve the... -
An Experimentally Verified Attack on 820-Round Trivium
The cube attack is one of the most important cryptanalytic techniques against Trivium. As the method of recovering superpolies becomes more and more... -
Improved Graph-Based Model for Recovering Superpoly on Trivium
Recovering superpoly for a given cube is the key step in cube attacks - an algebraic cryptanalysis method for symmetric ciphers. Since 2015, division... -
More Balanced Polynomials: Cube Attacks on 810- And 825-Round Trivium with Practical Complexities
The key step of the cube attack is to recover the special polynomial, the superpoly, of the target cipher. In particular, the balanced superpoly, in... -
The MILP-aided conditional differential attack and its application to Trivium
Conditional differential attacks were proposed by Knellwolf et al. at ASIACRYPT 2010 which targeted at cryptographic primitives based on non-linear...
-
A Practical Key-Recovery Attack on 805-Round Trivium
The cube attack is one of the most important cryptanalytic techniques against Trivium. Many key-recovery attacks based on cube attacks have been... -
A Simpler Model for Recovering Superpoly on Trivium
The cube attack is a powerful cryptanalysis technique against symmetric primitives, especially for stream ciphers. One of the key step in a cube... -
PENTAVIUM: Potent Trivium-Like Stream Cipher Using Higher Radii Cellular Automata
Cellular Automata (CA) have recently evolved as a good cryptographic primitive. CA have been used as pseudorandom number generators in stream... -
Nacc-Guard: a lightweight DNN accelerator architecture for secure deep learning
Recent breakthroughs in artificial intelligence and deep neural networks (DNNs) have produced an explosive demand for computing platforms equipped...
-
A New Correlation Cube Attack Based on Division Property
Correlation cube attacks were proposed by Liu et al. at EUROCRYPT 2018, which targeted a modern symmetric-key cryptosystem based on nonlinear... -
GL-S-NFSR: A new NFSR structure and its period properties
Recently nonlinear feedback shift registers (NFSRs) have frequently been used as basic building blocks for stream ciphers. A major problem concerning...
-
Massive Superpoly Recovery with a Meet-in-the-Middle Framework
The cube attack extracts the information of secret key bits by recovering the coefficient called superpoly in the output bit with respect to a subset... -
New General Framework for Algebraic Degree Evaluation of NFSR-Based Cryptosystems
At CRYPTO 2017, Liu presented a general framework of iterative estimation of algebraic degree for NFSR-based cryptosystems, by exploiting a... -
Key Filtering in Cube Attacks from the Implementation Aspect
In cube attacks, key filtering is a basic step of identifying the correct key candidates by referring to the truth tables of superpolies. When terms... -
Correlation Cube Attack Revisited
In this paper, we improve the cube attack by exploiting low-degree factors of the superpoly w.r.t. certain “special” index set of cube (ISoC). This... -
An improved degree evaluation method of NFSR-based cryptosystems
In this paper, we study the algebraic degree evaluation of NFSR-based cryptosystems. The degree evaluation method based on the numeric map**...
-
Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies
Cube attacks exploit the algebraic properties of symmetric ciphers by recovering a special polynomial, the superpoly, and subsequently the secret... -
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware
FrodoKEM is a lattice-based key encapsulation mechanism, currently a semi-finalist in NIST’s post-quantum standardisation effort. A condition for...
-
From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers
Low energy is an important aspect of hardware implementation. For energy-limited battery-powered devices, low energy stream ciphers can play an...