{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T18:23:17Z","timestamp":1740162197970,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T00:00:00Z","timestamp":1558915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T00:00:00Z","timestamp":1558915200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s13389-019-00217-3","type":"journal-article","created":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T12:03:56Z","timestamp":1558958636000},"page":"375-392","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search"],"prefix":"10.1007","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6775-7804","authenticated-orcid":false,"given":"Marco","family":"Cianfriglia","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1545-7711","authenticated-orcid":false,"given":"Stefano","family":"Guarino","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3661-9836","authenticated-orcid":false,"given":"Massimo","family":"Bernaschi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0723-7847","authenticated-orcid":false,"given":"Flavio","family":"Lombardi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9016-074X","authenticated-orcid":false,"given":"Marco","family":"Pedicini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,27]]},"reference":[{"key":"217_CR1","unstructured":"Appendix to \u201cKite attack: reshaping the cube attack for a flexible GPU-based maxterm search\u201d. \n                    http:\/\/www.cranic.it\/cryptanalysis.html\n                    \n                  . Accessed 5 Feb 2019"},{"key":"217_CR2","unstructured":"Agnesse, A., Pedicini, M.: Cube attack in finite fields of higher order. In: Proceedings of 9th Australasian Information Security Conference, AISC\u201911, pp. 9\u201314. ACS, Inc. (2011)"},{"key":"217_CR3","unstructured":"Agostini, E., Bernaschi, M.: Bitcracker: Bitlocker meets GPUs. CoRR (2019). \n                    arXiv:1901.01337"},{"key":"217_CR4","first-page":"40","volume":"2015","author":"Z Ahmadian","year":"2015","unstructured":"Ahmadian, Z., Rasoolzadeh, S., Salmasizadeh, M., Aref, M.R.: Automated dynamic cube attack on block ciphers: cryptanalysis of SIMON and KATAN. IACR Cryptol. ePrint Arch. 2015, 40 (2015)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"217_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2120-9","author":"A Ahmadzadeh","year":"2017","unstructured":"Ahmadzadeh, A., Hajihassani, O., Gorgin, S.: A high-performance and energy-efficient exhaustive key search approach via GPU on DES-like cryptosystems. J. Supercomput. (2017). \n                    https:\/\/doi.org\/10.1007\/s11227-017-2120-9","journal-title":"J. Supercomput."},{"key":"217_CR6","unstructured":"Aumasson, J.P., Dinur, I., Henzen, L., Meier, W., Shamir, A.: Efficient FPGA implementation of high-dimensional cube testers on the stream cipher Grain-128. In: IACR Cryptology ePrint Archive (2009)"},{"key":"217_CR7","doi-asserted-by":"crossref","unstructured":"Aumasson, J.P., Dinur, I., Meier, W., Shamir, A.: Cube testers and key recovery attacks on reduced-round MD6 and Trivium. In: FSE, pp. 1\u201322. Springer (2009)","DOI":"10.1007\/978-3-642-03317-9_1"},{"key":"217_CR8","unstructured":"Baksi, A., Maitra, S., Sarkar, S.: New distinguishers for reduced round Trivium and Trivia-SC using cube testers. In: WCC2015\u20149th International Workshop on Coding and Cryptography (2015)"},{"key":"217_CR9","unstructured":"Bernstein, D.J.: Why haven\u2019t cube attacks broken anything? \n                    https:\/\/cr.yp.to\/cubeattacks.html\n                    \n                  . Accessed 4 April 2018"},{"key":"217_CR10","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van\u00a0Assche, G., Van Keer, R.: CAESAR submission: Ketje v2. \n                    https:\/\/keccak.team\/files\/Ketjev2-doc2.0.pdf\n                    \n                  . Accessed 5 May 2019"},{"key":"217_CR11","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Priemuth-Schmid, D., Zhang, B.: Multiset collision attacks on reduced-round SNOW 3G and SNOW 3G+. In: International Conference on Applied Cryptography and Network Security, ACNS 2010, pp. 139\u2013153. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-13708-2_9"},{"key":"217_CR12","doi-asserted-by":"crossref","unstructured":"Blum, M., Luby, M., Rubinfeld, R.: Self-testing\/correcting with applications to numerical problems. In: ACM Symposium on Theory of Computing, pp. 73\u201383. ACM (1990)","DOI":"10.1145\/100216.100225"},{"key":"217_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0137-2","author":"A Chakraborti","year":"2016","unstructured":"Chakraborti, A., Chattopadhyay, A., Hassan, M., Nandi, M.: TriviA and uTriviA: two fast and secure authenticated encryption schemes. J. Cryptogr. Eng. (2016). \n                    https:\/\/doi.org\/10.1007\/s13389-016-0137-2","journal-title":"J. Cryptogr. Eng."},{"key":"217_CR14","doi-asserted-by":"publisher","unstructured":"Cianfriglia, M., Guarino, S.: Cryptanalysis on GPUs with the cube attack: design, optimization and performances gains. In: International Conference on High Performance Computing Simulation (HPCS), pp. 753\u2013760 (2017). \n                    https:\/\/doi.org\/10.1109\/HPCS.2017.114","DOI":"10.1109\/HPCS.2017.114"},{"key":"217_CR15","doi-asserted-by":"crossref","unstructured":"Cianfriglia, M., Guarino, S., Bernaschi, M., Lombardi, F., Pedicini, M.: A novel GPU-based implementation of the cube attack. In: Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, 10\u201312 July 2017, Proceedings, pp. 184\u2013207. Springer (2017)","DOI":"10.1007\/978-3-319-61204-1_10"},{"key":"217_CR16","doi-asserted-by":"publisher","unstructured":"Dinur, I., G\u00fcneysu, T., Paar, C., Shamir, A., Zimmermann, R.: An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. In: International Conference on The Theory and Application of Cryptology and Information Security, ASIACRYPT\u201911, pp. 327\u2013343. Springer, Berlin (2011). \n                    https:\/\/doi.org\/10.1007\/978-3-642-25385-0_18","DOI":"10.1007\/978-3-642-25385-0_18"},{"key":"217_CR17","doi-asserted-by":"crossref","unstructured":"Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Advances in Cryptology-EUROCRYPT 2009, pp. 278\u2013299. Springer (2009)","DOI":"10.1007\/978-3-642-01001-9_16"},{"key":"217_CR18","doi-asserted-by":"crossref","unstructured":"Dinur, I., Shamir, A.: Breaking Grain-128 with dynamic cube attacks. In: FSE 2011, pp. 167\u2013187. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-21702-9_10"},{"issue":"3\u20134","key":"217_CR19","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s12095-012-0068-4","volume":"4","author":"I Dinur","year":"2012","unstructured":"Dinur, I., Shamir, A.: Applying cube attacks to stream ciphers in realistic scenarios. Cryptogr. Commun. 4(3\u20134), 217\u2013232 (2012)","journal-title":"Cryptogr. Commun."},{"issue":"1","key":"217_CR20","doi-asserted-by":"publisher","first-page":"259","DOI":"10.13154\/tosc.v2017.i1.259-280","volume":"2017","author":"X Dong","year":"2017","unstructured":"Dong, X., Li, Z., Wang, X., Qin, L.: Cube-like attack on round-reduced initialization of Ketje Sr. IACR Trans. Symmetric Cryptol. 2017(1), 259\u2013280 (2017). \n                    https:\/\/doi.org\/10.13154\/tosc.v2017.i1.259-280","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"217_CR21","doi-asserted-by":"crossref","unstructured":"Fan, X., Gong, G.: On the security of Hummingbird-2 against side channel cube attacks. In: Proceedings of the 4th WEWoRC Workshop, pp. 18\u201329. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-34159-5_2"},{"key":"217_CR22","doi-asserted-by":"crossref","unstructured":"Fouque, P.A., Vannet, T.: Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks. FSE 2013, Revised Selected Papers, pp. 502\u2013517 (2014)","DOI":"10.1007\/978-3-662-43933-3_26"},{"issue":"4","key":"217_CR23","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"26","author":"M Hellman","year":"2006","unstructured":"Hellman, M.: A cryptanalytic time-memory trade-off. IEEE Trans. Inf. Theor. 26(4), 401\u2013406 (2006). \n                    https:\/\/doi.org\/10.1109\/TIT.1980.1056220","journal-title":"IEEE Trans. Inf. Theor."},{"key":"217_CR24","doi-asserted-by":"publisher","unstructured":"Huo, X., Krishnamoorthy, S., Agrawal, G.: Efficient scheduling of recursive control flow on GPUs. In: Proceedings of the 27th International ACM Conference on Supercomputing, ICS\u201913, pp. 409\u2013420. ACM, New York, NY, USA (2013). \n                    https:\/\/doi.org\/10.1145\/2464996.2479870","DOI":"10.1145\/2464996.2479870"},{"issue":"12","key":"217_CR25","doi-asserted-by":"publisher","first-page":"2088","DOI":"10.1016\/j.jss.2011.05.027","volume":"84","author":"F Milo","year":"2011","unstructured":"Milo, F., Bernaschi, M., Bisson, M.: A fast, GPU based, dictionary attack to OpenPGP secret keyrings. J. Syst. Softw. 84(12), 2088\u20132096 (2011)","journal-title":"J. Syst. Softw."},{"key":"217_CR26","unstructured":"O\u2019Neil, S.: Algebraic structure defectoscopy. In: Tools for Cryptanalysis 2007 Workshop (2007). \n                    http:\/\/eprint.iacr.org\/2007\/378"},{"key":"217_CR27","first-page":"97","volume":"3","author":"G Orhanou","year":"2010","unstructured":"Orhanou, G., Youssef, B.: SNOW 3G stream cipher operation and complexity study. Contemp. Eng. Sci. 3, 97\u2013111 (2010)","journal-title":"Contemp. Eng. Sci."},{"key":"217_CR28","first-page":"800","volume":"2013","author":"FM Quedenfeld","year":"2013","unstructured":"Quedenfeld, F.M., Wolf, C.: Algebraic properties of the cube attack. IACR Cryptol. ePrint Arch. 2013, 800 (2013)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"217_CR29","doi-asserted-by":"crossref","unstructured":"Samorodnitsky, A., Trevisan, L.: A PCP characterization of NP with optimal amortized query complexity. In: Proceedings of the ACM Symposium on ToC, pp. 191\u2013199. ACM (2000)","DOI":"10.1145\/335305.335329"},{"issue":"3","key":"217_CR30","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1080\/09720529.2014.995967","volume":"18","author":"C Srinivasan","year":"2015","unstructured":"Srinivasan, C., Pillai, U.U., Lakshmy, K., Sethumadhavan, M.: Cube attack on stream ciphers using a modified linearity test. J. Discrete Math. Sci. Cryptogr. 18(3), 301\u2013311 (2015)","journal-title":"J. Discrete Math. Sci. Cryptogr."},{"key":"217_CR31","unstructured":"Using shared memory in CUDA C\/C++. \n                    https:\/\/devblogs.nvidia.com\/using-shared-memory-cuda-cc\/\n                    \n                  . Accessed 4 Nov 2019"},{"key":"217_CR32","unstructured":"Vielhaber, M.: Breaking ONE.FIVIUM by AIDA an algebraic IV differential attack. In: IACR Eprint archive (2007). \n                    http:\/\/eprint.iacr.org\/2007\/413\n                    \n                  . Accessed 5 May 2019"},{"key":"217_CR33","doi-asserted-by":"crossref","unstructured":"Winter, R., Salagean, A., Phan, R.C.W.: Comparison of cube attacks over different vector spaces. In: IMACC 2015, pp. 225\u2013238. Springer, New York (2015)","DOI":"10.1007\/978-3-319-27239-9_14"},{"key":"217_CR34","unstructured":"Zhang, H., Wang, X.: Cryptanalysis of stream cipher Grain Family. In: IACR Cryptology ePrint Archive, vol. 2009, p. 109 (2009)"},{"key":"217_CR35","doi-asserted-by":"publisher","unstructured":"Zhang, S., Chen, G., Li, J.: Cube attack on reduced-round Quavium. ICMII-15 Advances in Computer Science Research (2015). \n                    https:\/\/doi.org\/10.2991\/icmii-15.2015.25","DOI":"10.2991\/icmii-15.2015.25"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-019-00217-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-019-00217-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-019-00217-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,25]],"date-time":"2020-05-25T23:17:20Z","timestamp":1590448640000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-019-00217-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,27]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["217"],"URL":"https:\/\/doi.org\/10.1007\/s13389-019-00217-3","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"type":"print","value":"2190-8508"},{"type":"electronic","value":"2190-8516"}],"subject":[],"published":{"date-parts":[[2019,5,27]]},"assertion":[{"value":"10 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}