Oct. 13, 2023, 12:48 p.m. |

IACR News www.iacr.org

ePrint Report: Key Filtering in Cube Attacks from the Implementation Aspect

Hao Fan, Yonglin Hao, Qingju Wang, Xinxin Gong, Lin Jiao


In cube attacks, key filtering is a basic step of identifying the correct key candidates by referring to the truth tables of superpolies. When terms of superpolies get massive, the truth table lookup complexity of key filtering increases significantly. In this paper, we propose the concept of implementation dependency dividing all cube attacks into two categories: implementation dependent and …

aspect attacks basic cube eprint report fan implementation key report tables terms truth wang

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)