Welcome to the resource topic for 2015/1009
Title:
Applications of Key Recovery Cube-attack-like
Authors: Pawel Morawiecki, Josef Pieprzyk, Michal Straus, Marian Srebrny
Abstract:In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Phase, where complexity can be calculated without running the actual experiments and random-like search for the cubes. We apply our method to a few different cryptographic algorithms, showing that the method can be used against a wide range of cryptographic primitives, including hash functions and authenticated encryption schemes. We also show that our key-recovery approach could be a framework for side-channel attacks, where the attacker has to deal with random errors in measurements.
ePrint: https://eprint.iacr.org/2015/1009
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .