all InfoSec news
Key Filtering in Cube Attacks from the Implementation Aspect
Oct. 13, 2023, 12:48 p.m. |
IACR News www.iacr.org
ePrint Report: Key Filtering in Cube Attacks from the Implementation Aspect
Hao Fan, Yonglin Hao, Qingju Wang, Xinxin Gong, Lin Jiao
In cube attacks, key filtering is a basic step of identifying the correct key candidates by referring to the truth tables of superpolies. When terms of superpolies get massive, the truth table lookup complexity of key filtering increases significantly. In this paper, we propose the concept of implementation dependency dividing all cube attacks into two categories: implementation dependent and …
aspect attacks basic cube eprint report fan implementation key report tables terms truth wang
More from www.iacr.org / IACR News
Post-Doc in Lattice-Based Cryptography
1 day, 19 hours ago |
www.iacr.org
WPEC 2024: NIST Workshop on Privacy Enhancing Cryptography
1 day, 19 hours ago |
www.iacr.org
Indistinguishability Obfuscation from Bilinear Maps and LPN Variants
1 day, 23 hours ago |
www.iacr.org
Securing the Future of GenAI: Policy and Technology
1 day, 23 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Security Compliance Strategist
@ Grab | Petaling Jaya, Malaysia
Cloud Security Architect, Lead
@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)