搜索结果: 1-4 共查到“Conditional Cube Attack”相关记录4条 . 查询时间(0.062 秒)
New Conditional Cube Attack on Keccak Keyed Modes
Conditional Cube Attack Keccak KMAC
font style='font-size:12px;'>
2019/4/22
Conditional cube attack on round-reduced \textsc{Keccak} keyed modes was proposed by Huang et al. at EUROCRYPT 2017. In their attack, a conditional cube variable was introduced, whose diffusion was si...
Conditional Cube Attack on Round-Reduced River Keyak
secret-key encryption round-reduced River Keyak
font style='font-size:12px;'>
2017/10/19
This paper evaluates the security level of the River Keyak against the cube-like attack. River Keyak is the only lightweight scheme of the Keccak-permutation-based Authenticated Encryption Cipher Keya...
Conditional Cube Attack on Round-Reduced ASCON
secret-key cryptography Keyak
font style='font-size:12px;'>
2017/2/24
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. Ascon submitted by Dobraunig et al. is one of 16 survivors of the 3rd round CAESAR competition. The cu...
Conditional Cube Attack on Reduced-Round Keccak Sponge Function
Keccak-MAC Keyak cube tester
font style='font-size:12px;'>
2016/12/10
The security analysis of Keccak, the winner of SHA-3, has attracted considerable interest. Recently, some attention has been paid to the analysis of keyed modes of Keccak sponge function. As a notable...