{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T04:47:46Z","timestamp":1747284466666,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319612034"},{"type":"electronic","value":"9783319612041"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61204-1_10","type":"book-chapter","created":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T06:02:42Z","timestamp":1498370562000},"page":"184-207","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Novel GPU-Based Implementation of the Cube Attack"],"prefix":"10.1007","author":[{"given":"Marco","family":"Cianfriglia","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Guarino","sequence":"additional","affiliation":[]},{"given":"Massimo","family":"Bernaschi","sequence":"additional","affiliation":[]},{"given":"Flavio","family":"Lombardi","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Pedicini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,26]]},"reference":[{"key":"10_CR1","unstructured":"Agnesse, A., Pedicini, M.: Cube attack in finite fields of higher order. In: Proceedings of 9th Australasian Information Security Conference, AISC 2011, pp. 9\u201314. ACS, Inc. (2011)"},{"key":"10_CR2","unstructured":"Agostini, E.: Bitlocker dictionary attack using GPUs. In: University of Cambridge Passwords 2015 Conference (2015). https:\/\/www.cl.cam.ac.uk\/events\/passwords2015\/preproceedings.pdf"},{"key":"10_CR3","unstructured":"Ahmadian, Z., Rasoolzadeh, S., Salmasizadeh, M., Aref, M.R.: Automated dynamic cube attack on block ciphers: cryptanalysis of SIMON and KATAN. IACR Cryptology ePrint Archive 2015, 40 (2015)"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-03317-9_1","volume-title":"Fast Software Encryption","author":"J-P Aumasson","year":"2009","unstructured":"Aumasson, J.-P., Dinur, I., Meier, W., Shamir, A.: Cube testers and key recovery attacks on reduced-round MD6 and trivium. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 1\u201322. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-03317-9_1"},{"key":"10_CR5","unstructured":"Baksi, A., Maitra, S., Sarkar, S.: New distinguishers for reduced round trivium and trivia-SC using cube testers. In: WCC2015-9th International Workshop on Coding and Cryptography 2015 (2015)"},{"key":"10_CR6","unstructured":"Bernstein, D.J.: Why haven\u2019t cube attacks broken anything? https:\/\/cr.yp.to\/cubeattacks.html. Accessed 11 Nov 2016"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Blum, M., Luby, M., Rubinfeld, R.: Self-testing\/correcting with applications to numerical problems. In: ACM Symposium on Theory of Computing, pp. 73\u201383. ACM (1990)","DOI":"10.1145\/100216.100225"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/11836810_13","volume-title":"Information Security","author":"C De Canni\u00e8re","year":"2006","unstructured":"De Canni\u00e8re, C.: Trivium: a stream cipher construction inspired by block cipher design principles. In: Katsikas, S.K., L\u00f3pez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 171\u2013186. Springer, Heidelberg (2006). doi:10.1007\/11836810_13"},{"key":"10_CR9","unstructured":"De Canniere, C., Preneel, B.: Trivium-specifications. eSTREAM, ECRYPT stream cipher project, report 2005\/030 (2005)"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-01001-9_16","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"I Dinur","year":"2009","unstructured":"Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 278\u2013299. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-01001-9_16"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-642-21702-9_10","volume-title":"Fast Software Encryption","author":"I Dinur","year":"2011","unstructured":"Dinur, I., Shamir, A.: Breaking grain-128 with dynamic cube attacks. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 167\u2013187. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-21702-9_10"},{"issue":"3\u20134","key":"10_CR12","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s12095-012-0068-4","volume":"4","author":"I Dinur","year":"2012","unstructured":"Dinur, I., Shamir, A.: Applying cube attacks to stream ciphers in realistic scenarios. Cryptogr. Commun. 4(3\u20134), 217\u2013232 (2012)","journal-title":"Cryptogr. Commun."},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-642-34159-5_2","volume-title":"Research in Cryptology","author":"X Fan","year":"2012","unstructured":"Fan, X., Gong, G.: On the security of Hummingbird-2 against side channel cube attacks. In: Armknecht, F., Lucks, S. (eds.) WEWoRC 2011. LNCS, vol. 7242, pp. 18\u201329. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-34159-5_2"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1007\/978-3-662-43933-3_26","volume-title":"Fast Software Encryption","author":"P-A Fouque","year":"2014","unstructured":"Fouque, P.-A., Vannet, T.: Improving key recovery to 784 and 799 rounds of trivium using optimized cube attacks. In: Moriai, S. (ed.) FSE 2013. LNCS, vol. 8424, pp. 502\u2013517. Springer, Heidelberg (2014). doi:10.1007\/978-3-662-43933-3_26"},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-34931-7_3","volume-title":"Progress in Cryptology - INDOCRYPT 2012","author":"T Kleinjung","year":"2012","unstructured":"Kleinjung, T., Lenstra, A.K., Page, D., Smart, N.P.: Using the cloud to determine key strengths. In: Galbraith, S., Nandi, M. (eds.) INDOCRYPT 2012. LNCS, vol. 7668, pp. 17\u201339. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-34931-7_3"},{"issue":"2","key":"10_CR16","doi-asserted-by":"publisher","first-page":"63","DOI":"10.7494\/csci.2012.13.2.63","volume":"13","author":"M Marks","year":"2012","unstructured":"Marks, M., Jantura, J., Niewiadomska-Szynkiewicz, E., Strzelczyk, P., G\u00f3\u017ad\u017a, K.: Heterogeneous GPU&CPU cluster for high performance computing in cryptography. Comput. Sci. 13(2), 63\u201379 (2012)","journal-title":"Comput. Sci."},{"issue":"12","key":"10_CR17","doi-asserted-by":"publisher","first-page":"2088","DOI":"10.1016\/j.jss.2011.05.027","volume":"84","author":"F Milo","year":"2011","unstructured":"Milo, F., Bernaschi, M., Bisson, M.: A fast, GPU based, dictionary attack to OpenPGP secret keyrings. J. Syst. Softw. 84(12), 2088\u20132096 (2011)","journal-title":"J. Syst. Softw."},{"key":"10_CR18","unstructured":"O\u2019Neil, S.: Algebraic structure defectoscopy (2007). Tools for Cryptanalysis 2007 Workshop. http:\/\/eprint.iacr.org\/2007\/378"},{"key":"10_CR19","unstructured":"Quedenfeld, F.M., Wolf, C.: Algebraic properties of the cube attack. IACR Cryptology ePrint Archive 2013, 800 (2013)"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Samorodnitsky, A.: Low-degree tests at large distances. In: Proceedings of 39th ACM symposium on Theory of Computing, pp. 506\u2013515. ACM (2007)","DOI":"10.1145\/1250790.1250864"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Samorodnitsky, A., Trevisan, L.: A PCP characterization of NP with optimal amortized query complexity. In: Proceedings ACM Symposium on ToC, pp. 191\u2013199. ACM (2000)","DOI":"10.1145\/335305.335329"},{"key":"10_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-319-27179-8_18","volume-title":"Innovative Security Solutions for Information Technology and Communications","author":"D Shanmugam","year":"2015","unstructured":"Shanmugam, D., Annadurai, S.: Secure implementation of stream cipher: trivium. In: Bica, I., Naccache, D., Simion, E. (eds.) SECITC 2015. LNCS, vol. 9522, pp. 253\u2013266. Springer, Cham (2015). doi:10.1007\/978-3-319-27179-8_18"},{"issue":"3","key":"10_CR23","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1080\/09720529.2014.995967","volume":"18","author":"C Srinivasan","year":"2015","unstructured":"Srinivasan, C., Pillai, U.U., Lakshmy, K., Sethumadhavan, M.: Cube attack on stream ciphers using a modified linearity test. J. Discret. Math. Sci. Cryptogr. 18(3), 301\u2013311 (2015)","journal-title":"J. Discret. Math. Sci. Cryptogr."},{"key":"10_CR24","unstructured":"Vielhaber, M.: Breaking ONE.FIVIUM by AIDA an algebraic IV differential attack (2007). http:\/\/eprint.iacr.org\/2007\/413"},{"key":"10_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-319-27239-9_14","volume-title":"Cryptography and Coding","author":"R Winter","year":"2015","unstructured":"Winter, R., Salagean, A., Phan, R.C.-W.: Comparison of cube attacks over different vector spaces. In: Groth, J. (ed.) IMACC 2015. LNCS, vol. 9496, pp. 225\u2013238. Springer, Cham (2015). doi:10.1007\/978-3-319-27239-9_14"},{"key":"10_CR26","doi-asserted-by":"publisher","unstructured":"Zhang, S., Chen, G., Li, J.: Cube attack on reduced-round Quavium. ICMII-15 Adv. Comput. Sci. Res. (2015). doi:10.2991\/icmii-15.2015.25","DOI":"10.2991\/icmii-15.2015.25"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61204-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:03:38Z","timestamp":1656201818000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-61204-1_10"}},"subtitle":["Preliminary Results Against Trivium"],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319612034","9783319612041"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61204-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"26 June 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kanazawa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cy2sec.comm.eng.osaka-u.ac.jp\/acns2017\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}