all InfoSec news
More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities
Aug. 21, 2023, 8:36 a.m. |
IACR News www.iacr.org
ePrint Report: More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities
haolei, Jiahui He, Kai Hu, Meiqin Wang
The key step of the cube attack is to recover the special polynomial, the superpoly, of the target cipher. In particular, the balanced superpoly, in which there exists at least one secret variable as a single monomial and none of the other monomials contain this variable, can be exploited to reveal one-bit information about the key bits. However, …
attack attacks cipher cube eprint report key recover report special target the key wang
More from www.iacr.org / IACR News
Secure Coded Distributed Computing
1 day, 15 hours ago |
www.iacr.org
Secure Implementation of SRAM PUF for Private Key Generation
1 day, 16 hours ago |
www.iacr.org
Multiple academic teaching positions
2 days, 14 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
DevSecOps Engineer
@ Material Bank | Remote
Instrumentation & Control Engineer - Cyber Security
@ ASSYSTEM | Bridgwater, United Kingdom
Security Consultant
@ Tenable | MD - Columbia - Headquarters
Management Consultant - Cybersecurity - Internship
@ Wavestone | Hong Kong, Hong Kong
TRANSCOM IGC - Cybersecurity Engineer
@ IT Partners, Inc | St. Louis, Missouri, United States
Manager, Security Operations Engineering (EMEA)
@ GitLab | Remote, EMEA