{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T13:58:33Z","timestamp":1775829513012,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642010002","type":"print"},{"value":"9783642010019","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01001-9_16","type":"book-chapter","created":{"date-parts":[[2009,4,15]],"date-time":"2009-04-15T12:38:25Z","timestamp":1239799105000},"page":"278-299","source":"Crossref","is-referenced-by-count":259,"title":["Cube Attacks on Tweakable Black Box Polynomials"],"prefix":"10.1007","author":[{"given":"Itai","family":"Dinur","sequence":"first","affiliation":[]},{"given":"Adi","family":"Shamir","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Ajwa, I.A., Liu, Z., Wang, P.S.: Gr\u00f6bner bases algorithm. Technical report, ICM Technical Reports Series (ICM-199502-00) (1995)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Faug\u00e8re, J.c.: A new efficient algorithm for computing gr\u00f6bner bases (f4). Journal of Pure and Applied Algebra, 75\u201383 (1999)","DOI":"10.1016\/S0022-4049(99)00005-5"},{"key":"16_CR3","unstructured":"Gwenole, A., Jean-Charles, F., Hideki, I., Mitsuru, K., Makoto, S.: Comparison Between XL and Groebner Basis Algorithms (2004)"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/3-540-45539-6_27","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"N.T. Courtois","year":"2000","unstructured":"Courtois, N.T., Klimov, A.B., Patarin, J., Shamir, A.: Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 392\u2013407. Springer, Heidelberg (2000)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Courtois, N., Patarin, J.: About the xl algorithm over gf(2). In: CT-RSA, pp. 141\u2013157 (2003)","DOI":"10.1007\/3-540-36563-X_10"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-540-30191-2_31","volume-title":"Information and Communications Security","author":"B.-Y. Yang","year":"2004","unstructured":"Yang, B.-Y., Chen, J.-M., Courtois, N.T.: On asymptotic security estimates in XL and gr\u00f6bner bases-related algebraic cryptanalysis. In: L\u00f3pez, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol.\u00a03269, pp. 401\u2013413. Springer, Heidelberg (2004)"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/3-540-36178-2_17","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"N.T. Courtois","year":"2002","unstructured":"Courtois, N.T., Pieprzyk, J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 267\u2013287. Springer, Heidelberg (2002)"},{"key":"16_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/BFb0052343","volume-title":"Fast Software Encryption","author":"J. Daemen","year":"1997","unstructured":"Daemen, J., Knudsen, L.R., Rijmen, V.: The block cipher square. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 149\u2013165. Springer, Heidelberg (1997)"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Arora, S.: Probabilistic checking of proofs: a new characterization of np. Journal of the ACM, 2\u201313 (1998)","DOI":"10.1145\/273865.273901"},{"key":"16_CR10","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1016\/0022-0000(93)90044-W","volume":"47","author":"M. Blum","year":"1993","unstructured":"Blum, M., Luby, M., Rubinfeld, R.: Self-testing\/correcting with applications to numerical problems. Journal of Computer and System Sciences\u00a047, 549\u2013595 (1993)","journal-title":"Journal of Computer and System Sciences"},{"key":"16_CR11","first-page":"345","volume-title":"Algebraic attacks on stream ciphers with linear feedback","author":"N.T. Courtois","year":"2003","unstructured":"Courtois, N.T., Meier, W.: Algebraic attacks on stream ciphers with linear feedback, pp. 345\u2013359. Springer, Heidelberg (2003)"},{"key":"16_CR12","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/3-540-60865-6_52","volume-title":"Proceedings of the Third International Workshop on Fast Software Encryption","author":"J.D.. Golic","year":"1996","unstructured":"Golic, J.D.: On the security of nonlinear filter generators. In: Proceedings of the Third International Workshop on Fast Software Encryption, London, UK, pp. 173\u2013188. Springer, Heidelberg (1996)"},{"key":"16_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-540-45146-4_11","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"N.T. Courtois","year":"2003","unstructured":"Courtois, N.T.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 176\u2013194. Springer, Heidelberg (2003)"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Englund, H., Johansson, T.: A new simple technique to attack filter generators and related ciphers. In: Selected Areas in Cryptography, pp. 39\u201353 (2004)","DOI":"10.1007\/978-3-540-30564-4_3"},{"issue":"10","key":"16_CR15","doi-asserted-by":"publisher","first-page":"1100","DOI":"10.1109\/12.888045","volume":"49","author":"J.D. Golic","year":"2000","unstructured":"Golic, J.D., Clark, A., Dawson, E.: Generalized inversion attack on nonlinear filter generators. IEEE Trans. Comput.\u00a049(10), 1100\u20131109 (2000)","journal-title":"IEEE Trans. Comput."},{"key":"16_CR16","first-page":"300","volume-title":"Fast correlation attacks through reconstruction of linear polynomials","author":"T. Johansson","year":"2000","unstructured":"Johansson, T., Jnsson, F.: Fast correlation attacks through reconstruction of linear polynomials, pp. 300\u2013315. Springer, Heidelberg (2000)"},{"key":"16_CR17","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/BFb0052332","volume-title":"Fast Software Encryption","author":"T. Jakobsen","year":"1997","unstructured":"Jakobsen, T., Knudsen, L.R.: The interpolation attack on block ciphers. In: Fast Software Encryption, pp. 28\u201340. Springer, Heidelberg (1997)"},{"key":"16_CR18","unstructured":"Garey, M.R., Johnson, D.S.: Computers, and Interactibility. A guide to the theory of np-completeness. Bell Telephone Labratories, Incorporated"},{"key":"16_CR19","volume-title":"Fast Software Encryption","author":"J.-P. Aumasson","year":"2009","unstructured":"Aumasson, J.-P., Dinur, I., Meier, W., Shamir, A.: Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium. In: Fast Software Encryption. Springer, Heidelberg (2009)"},{"key":"16_CR20","unstructured":"estream: Ecrypt stream cipher project, http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"16_CR21","unstructured":"De Canni\u00e8re, C., Preneel, B.: Trivium - a stream cipher construction inspired by block cipher design principles. estream, ecrypt stream cipher. Technical report, of Lecture Notes in Computer Science"},{"key":"16_CR22","unstructured":"Raddum, H.: Cryptanalytic results on trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2006\/039, 2006 (2006), www.ecrypt.eu.org\/stream\/papersdir\/2006\/039.ps"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Maximov, A., Biryukov, A.: Two trivial attacks on trivium. In: Selected Areas in Cryptography, pp. 36\u201355 (2007)","DOI":"10.1007\/978-3-540-77360-3_3"},{"key":"16_CR24","unstructured":"McDonald, C.C.C., Pieprzyk, J.: Attacking bivium with minisat, http:\/\/eprint.iacr.org\/2007\/040"},{"key":"16_CR25","unstructured":"S\u00f6nmez Turan, M., Kara, O.: Linear approximations for 2-round trivium. In: Proc. First International Conference on Security of Information and Networks (SIN 2007), pp. 96\u2013105. Trafford Publishing (2007)"},{"key":"16_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-540-77026-8_20","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2007","author":"H. Englund","year":"2007","unstructured":"Englund, H., Johansson, T., S\u00f6nmez Turan, M.: A framework for chosen IV statistical analysis of stream ciphers. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol.\u00a04859, pp. 268\u2013281. Springer, Heidelberg (2007)"},{"key":"16_CR27","unstructured":"Vielhaber, M.: Breaking one.fivium by aida an algebraic iv differential attack. Cryptology ePrint Archive, Report 2007\/413"},{"key":"16_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-540-68164-9_16","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"S. Fischer","year":"2008","unstructured":"Fischer, S., Khazaei, S., Meier, W.: Chosen IV statistical analysis for key recovery attacks on stream ciphers. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol.\u00a05023, pp. 236\u2013245. Springer, Heidelberg (2008)"},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Joux, A., Muller, F.: A chosen iv attack against turing. In: Selected Areas in Cryptography, pp. 194\u2013207 (2003)","DOI":"10.1007\/978-3-540-24654-1_14"},{"key":"16_CR30","unstructured":"O\u2019Neil, S.: Algebraic structure defectoscopy. Cryptology ePrint Archive, Report 2007\/378"},{"key":"16_CR31","doi-asserted-by":"crossref","unstructured":"Juhani, M., Saarinen, O.: Chosen-iv statistical attacks on estream ciphers. In: Proceeding of SECRYPT 2006, pp. 260\u2013266 (2006)","DOI":"10.5220\/0002098302600266"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - EUROCRYPT 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01001-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T23:43:09Z","timestamp":1739058189000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01001-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642010002","9783642010019"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01001-9_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}