Trivial transciphering with Trivium and TFHE
T Balenbois, JB Orfila, N Smart - Proceedings of the 11th Workshop on …, 2023 - dl.acm.org
We examine the use of Trivium and Kreyvium as transciphering mechanisms for use with the
TFHE FHE scheme. Trivium was introduced in the eSTREAM project as a general purpose …
TFHE FHE scheme. Trivium was introduced in the eSTREAM project as a general purpose …
Fourteen years of cube attacks
Algebraic Cryptanalysis is a widely used technique that tackles the problem of breaking
ciphers mainly relying on the ability to express a cryptosystem as a solvable polynomial …
ciphers mainly relying on the ability to express a cryptosystem as a solvable polynomial …
A high-performance and energy-efficient exhaustive key search approach via GPU on DES-like cryptosystems
Recently, graphical processing units (GPUs) have found a prominent role in general-
purpose applications. Specifically, in parallel processing applications where a considerable …
purpose applications. Specifically, in parallel processing applications where a considerable …
Ten years of cube attacks
Abstract In 2009, Dinur and Shamir proposed the cube attack, an algebraic cryptanalysis
technique that only requires black box access to a target cipher. Since then, this attack has …
technique that only requires black box access to a target cipher. Since then, this attack has …
Cryptanalysis on GPUs with the cube attack: design, optimization and performances gains
M Cianfriglia, S Guarino - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
The cube attack is a flexible cryptanalysis technique, with a simple and fascinating
theoretical implant. It combines offline exhaustive searches over selected tweakable …
theoretical implant. It combines offline exhaustive searches over selected tweakable …
Kite attack: resha** the cube attack for a flexible GPU-based maxterm search
Dinur and Shamir's cube attack has attracted significant attention in the literature.
Nevertheless, the lack of implementations achieving effective results casts doubts on its …
Nevertheless, the lack of implementations achieving effective results casts doubts on its …
Revealing Modern Stream Ciphers Security: A Comprehensive Review
Stream ciphers are essential cryptographic primitives widely employed in various
applications for efficient data protection. This paper presents a comprehensive review of …
applications for efficient data protection. This paper presents a comprehensive review of …
Exploiting GPUs to speed up cryptanalysis and machine learning
M Cianfriglia - 2018 - arcadia.sba.uniroma3.it
In the past cryptography was mainly used by military organizations and governments for
secure communication. However today almost everyone uses it everywhere, even if most …
secure communication. However today almost everyone uses it everywhere, even if most …
[PDF][PDF] Trivial Transciphering With Trivium and TFHE
KU COSIC - esat.kuleuven.be
We examine the use of Trivium and Kreyvium as transciphering mechanisms for use with the
TFHE FHE scheme. Originally these two ciphers were investigated for FHE transciphering …
TFHE FHE scheme. Originally these two ciphers were investigated for FHE transciphering …