{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:27:35Z","timestamp":1750307255392,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,3,22]],"date-time":"2011-03-22T00:00:00Z","timestamp":1300752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,3,22]]},"DOI":"10.1145\/1966913.1966952","type":"proceedings-article","created":{"date-parts":[[2011,4,7]],"date-time":"2011-04-07T09:36:11Z","timestamp":1302168971000},"page":"296-305","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Extended cubes"],"prefix":"10.1145","author":[{"given":"Shekh Faisal","family":"Abdul-Latip","sequence":"first","affiliation":[{"name":"University of Wollongong, Australia"}]},{"given":"Mohammad Reza","family":"Reyhanitabar","sequence":"additional","affiliation":[{"name":"University of Wollongong, Australia"}]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[{"name":"University of Wollongong, Australia"}]},{"given":"Jennifer","family":"Seberry","sequence":"additional","affiliation":[{"name":"University of Wollongong, Australia"}]}],"member":"320","published-online":{"date-parts":[[2011,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12827-1_4"},{"key":"e_1_3_2_1_2_1","first-page":"489","volume-title":"Moyart","author":"Akkar M. L., B","year":"2000","unstructured":"Akkar , M. L., B &amp;#233;van, R., Dischamp , P. , Moyart , D. : Power analysis, what is now possible... In : Okamoto, T. (Ed.) ASIACRYPT 2000 . LNCS, vol. 1976 , pp. 489 -- 502 . Springer , Heidelberg (2000) Akkar, M. L., B&amp;#233;van, R., Dischamp, P., Moyart, D.: Power analysis, what is now possible... In: Okamoto, T. (Ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 489--502. Springer, Heidelberg (2000)"},{"key":"e_1_3_2_1_3_1","volume-title":"L.: Serpent: A Proposal for the Advanced Encryption Standard. In First Advanced Encryption Standard (AES) Conference","author":"Anderson R.","year":"1998","unstructured":"Anderson , R. , Biham , B. , Knudsen , L.: Serpent: A Proposal for the Advanced Encryption Standard. In First Advanced Encryption Standard (AES) Conference , ( 1998 ) Anderson, R., Biham, B., Knudsen, L.: Serpent: A Proposal for the Advanced Encryption Standard. In First Advanced Encryption Standard (AES) Conference, (1998)"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03317-9_1"},{"key":"e_1_3_2_1_5_1","volume-title":"Shamir","author":"Aumasson J. P.","year":"2009","unstructured":"Aumasson , J. P. , Dinur , I. , Henzen , L. , Meier , W. , Shamir , A. : Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128. IACR ePrint Archive, Report 2009 \/218 (2009), http:\/\/eprint.iacr.org\/2009\/218 Aumasson, J. P., Dinur, I., Henzen, L., Meier, W., Shamir, A.: Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128. IACR ePrint Archive, Report 2009\/218 (2009), http:\/\/eprint.iacr.org\/2009\/218"},{"key":"e_1_3_2_1_6_1","volume-title":"Jefferson","author":"Bard G. V.","year":"2007","unstructured":"Bard , G. V. , Courtois , N. T. , Jefferson , C. : Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers. IACR ePrint Archive, Report 2007 \/024 (2007), http:\/\/eprint.iacr.org\/2007\/024 Bard, G. V., Courtois, N. T., Jefferson, C.: Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers. IACR ePrint Archive, Report 2007\/024 (2007), http:\/\/eprint.iacr.org\/2007\/024"},{"key":"e_1_3_2_1_7_1","first-page":"327","volume-title":"Knudsen","year":"2002","unstructured":"B&amp;#233;van, R. , Knudsen , R. : Ways to Enhance Differential Power Analysis. In : Lee, P. J, Lim, C. H. (Eds.) ICISC 2002 . LNCS, vol. 2587 , pp. 327 -- 342 . Springer , Heidleberg (2003) B&amp;#233;van, R., Knudsen, R.: Ways to Enhance Differential Power Analysis. In: Lee, P. J, Lim, C. H. (Eds.) ICISC 2002. LNCS, vol. 2587, pp. 327--342. Springer, Heidleberg (2003)"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89754-5_20"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100225"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"e_1_3_2_1_11_1","first-page":"16","volume-title":"Olivier","author":"Brier E.","year":"2004","unstructured":"Brier , E. , Clavier , C. , Olivier , F. : Correlation Power Analysis with a Leakage Model. In : Joye, M., Quisquater, J.-J. (Eds.) CHES 2004 , LNCS, vol. 3156 , pp. 16 -- 29 . Springer , Heidelberg (2004) Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (Eds.) CHES 2004, LNCS, vol. 3156, pp. 16--29. Springer, Heidelberg (2004)"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68351-3_18"},{"key":"e_1_3_2_1_13_1","first-page":"252","volume-title":"Dabbous","author":"Clavier C.","year":"2000","unstructured":"Clavier , C. , Coron , J. S. , Dabbous , N. : Differential Power Analysis in the Presence of Hardware Countermeasures. In : Ko&amp;ccirc;, C.K., Paar, C. (Eds.) CHES 2000 . LNCS, vol. 1965 , pp. 252 -- 263 . Springer , Heidelberg (2000) Clavier, C., Coron, J. S., Dabbous, N.: Differential Power Analysis in the Presence of Hardware Countermeasures. In: Ko&amp;ccirc;, C.K., Paar, C. (Eds.) CHES 2000. LNCS, vol. 1965, pp. 252--263. Springer, Heidelberg (2000)"},{"key":"e_1_3_2_1_14_1","first-page":"157","volume-title":"Naccache","author":"Coron J. S.","year":"2000","unstructured":"Coron , J. S. , Kocher , P. , Naccache , D. : Statistics and Secret Leakage. In : Frankel, Y. (Ed.) FC 2000 . LNCS, vol. 1962 , pp. 157 -- 173 . Springer , Heidelberg (2001) Coron, J. S., Kocher, P., Naccache, D.: Statistics and Secret Leakage. In: Frankel, Y. (Ed.) FC 2000. LNCS, vol. 1962, pp. 157--173. Springer, Heidelberg (2001)"},{"key":"e_1_3_2_1_15_1","volume-title":"Rijmen","author":"Daemen J.","year":"1998","unstructured":"Daemen , J. , Rijmen , V. : AES Proposal: Rijndael. Technical Evaluation, CD-1: Documentation ( 1998 ) Daemen, J., Rijmen, V.: AES Proposal: Rijndael. Technical Evaluation, CD-1: Documentation (1998)"},{"key":"e_1_3_2_1_16_1","first-page":"278","volume-title":"Shamir","author":"Dinur I.","year":"2009","unstructured":"Dinur , I. , Shamir , A. : Cube Attacks on Tweakable Black Box Polynomials. In : Joux, A. (Ed.) EUROCRYPT 2009 . LNCS, vol. 5479 , pp. 278 -- 299 . Springer , Heidelberg (2009) Dinur, I., Shamir, A.: Cube Attacks on Tweakable Black Box Polynomials. In: Joux, A. (Ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 278--299. Springer, Heidelberg (2009)"},{"key":"e_1_3_2_1_17_1","volume-title":"Shamir","author":"Dinur I.","year":"2009","unstructured":"Dinur , I. , Shamir , A. : Side Channel Cube Attacks on Block Ciphers. Cryptology ePrint Archive, Report 2009 \/127 (2009), http:\/\/eprint.iacr.org\/2009\/127 Dinur, I., Shamir, A.: Side Channel Cube Attacks on Block Ciphers. Cryptology ePrint Archive, Report 2009\/127 (2009), http:\/\/eprint.iacr.org\/2009\/127"},{"key":"e_1_3_2_1_18_1","first-page":"268","volume-title":"M. S.: A Framework for Chosen IV Statistical Analysis of Stream Ciphers","author":"Englund H.","year":"2007","unstructured":"Englund , H. , Johansson , T. , Turan , M. S.: A Framework for Chosen IV Statistical Analysis of Stream Ciphers . In: Srinathan, K., Rangan, C. P., Yung, M. (Eds.) INDOCRYPT 2007. LNCS, vol. 4859 , pp. 268 -- 281 . Springer , Heidelberg ( 2007 ) Englund, H., Johansson, T., Turan, M. S.: A Framework for Chosen IV Statistical Analysis of Stream Ciphers. In: Srinathan, K., Rangan, C. P., Yung, M. (Eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 268--281. Springer, Heidelberg (2007)"},{"key":"e_1_3_2_1_19_1","first-page":"342","volume-title":"A New Statistical Testing for Symmetric Ciphers and Hash Functions","author":"Filiol E.","year":"2002","unstructured":"Filiol , E. : A New Statistical Testing for Symmetric Ciphers and Hash Functions . In: Deng, R. H., Qing, S., Bao, F., Zhou, J. (Eds.) ICICS 2002. LNCS, vol. 2513 , pp. 342 -- 353 . Springer , Heidelberg ( 2002 ) Filiol, E.: A New Statistical Testing for Symmetric Ciphers and Hash Functions. In: Deng, R. H., Qing, S., Bao, F., Zhou, J. (Eds.) ICICS 2002. LNCS, vol. 2513, pp. 342--353. Springer, Heidelberg (2002)"},{"key":"e_1_3_2_1_20_1","first-page":"236","volume-title":"Meier","author":"Fischer S.","year":"2008","unstructured":"Fischer , S. , Khazaei , S. , Meier , W. : Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. In : Vaudenay, S. (Ed.) AFRICACRYPT 2008 . LNCS, vol. 5023 , pp. 236 -- 245 . Springer , Heidelberg (2008) Fischer, S., Khazaei, S., Meier, W.: Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. In: Vaudenay, S. (Ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 236--245. Springer, Heidelberg (2008)"},{"key":"e_1_3_2_1_21_1","first-page":"158","volume-title":"Patarin","author":"Goubin L.","year":"1999","unstructured":"Goubin , L. , Patarin , J. : DES and Differential Power Analysis - The Duplication Method. In : Ko&amp;ccirc;, C.K., Paar, C. (Eds.) CHES 1999 . LNCS, vol. 1717 , pp. 158 -- 172 . Springer , Heidelberg (1999) Goubin, L., Patarin, J.: DES and Differential Power Analysis - The Duplication Method. In: Ko&amp;ccirc;, C.K., Paar, C. (Eds.) CHES 1999. LNCS, vol. 1717, pp. 158--172. Springer, Heidelberg (1999)"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68351-3_14"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89754-5_2"},{"key":"e_1_3_2_1_24_1","volume-title":"Jun","author":"Kocher J.","year":"1998","unstructured":"Kocher , J. , Jaffe , J. , Jun , B. : Introduction to Differential Power Analysis and Related Attacks . ( 1998 ), http:\/\/www.cryptography.com\/dpa\/technical. Kocher, J., Jaffe, J., Jun, B.: Introduction to Differential Power Analysis and Related Attacks. (1998), http:\/\/www.cryptography.com\/dpa\/technical."},{"key":"e_1_3_2_1_25_1","first-page":"388","volume-title":"Jun","author":"Kocher J.","year":"1999","unstructured":"Kocher , J. , Jaffe , J. , Jun , B. : Differential Power Analysis. In : Weiner, M. J. (Ed.) CRYPTO 99. LNCS, vol. 1666 , pp. 388 -- 397 . Springer , Heidelberg ( 1999 ) Kocher, J., Jaffe, J., Jun, B.: Differential Power Analysis. In: Weiner, M. J. (Ed.) CRYPTO 99. LNCS, vol. 1666, pp. 388--397. Springer, Heidelberg (1999)"},{"key":"e_1_3_2_1_26_1","first-page":"243","volume-title":"Morimoto","author":"Mamiya H.","year":"2004","unstructured":"Mamiya , H. , Miyaji , A. , Morimoto , H. : Efficient Countermeasures against RPA, DPA, and SPA. In: Joye, M., Quisquater, J. J (Eds.) CHES 2004 . LNCS, vol. 3156 , pp. 243 -- 319 . Springer , Heidelberg (2004) Mamiya, H., Miyaji, A., Morimoto, H.: Efficient Countermeasures against RPA, DPA, and SPA. In: Joye, M., Quisquater, J. J (Eds.) CHES 2004. LNCS, vol. 3156, pp. 243--319. Springer, Heidelberg (2004)"},{"key":"e_1_3_2_1_27_1","first-page":"222","volume-title":"Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness","author":"Mangard S.","year":"2004","unstructured":"Mangard , S. : Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness . In: Okamoto, T. (Ed.) CT-RSA 2004. LNCS, vol. 2964 , pp. 222 -- 235 . Springer , Heidelberg ( 2004 ) Mangard, S.: Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness. In: Okamoto, T. (Ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 222--235. Springer, Heidelberg (2004)"},{"key":"e_1_3_2_1_28_1","first-page":"78","volume-title":"Ko&amp;ccirc;","author":"Mayer-Sommer R.","year":"2000","unstructured":"Mayer-Sommer , R. : Smartly Analysis the Simplicity and the Power of Simple Power Analysis on Smartcards . In: Ko&amp;ccirc; , C.K., Paar, C. (Eds.) CHES 2000. LNCS, vol. 1965 , pp. 78 -- 92 . Springer , Heidelberg ( 2000 ) Mayer-Sommer, R.: Smartly Analysis the Simplicity and the Power of Simple Power Analysis on Smartcards. In: Ko&amp;ccirc;, C.K., Paar, C. (Eds.) CHES 2000. LNCS, vol. 1965, pp. 78--92. Springer, Heidelberg (2000)"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_13"},{"volume-title":"Yin","author":"Rivest R.","key":"e_1_3_2_1_32_1","unstructured":"Rivest , R. , Agre , B. , Bailey , D. V. , Crutchfield , C. , Dodis , Y. , Fleming , K. E. , Khan , A. , Krishnamurthy , J. , Lin , Y. , Reyzin , L. , Shen , E. , Sukha , J. , Sutherland , D. , Tromer , E. , Yin , Y. L. : The MD6 Hash Function - A Proposal to NIST for SHA- 3. http:\/\/groups.csail.mit.edu\/cis\/md6\/ Rivest, R., Agre, B., Bailey, D. V., Crutchfield, C., Dodis, Y., Fleming, K. E., Khan, A., Krishnamurthy, J., Lin, Y., Reyzin, L., Shen, E., Sukha, J., Sutherland, D., Tromer, E., Yin, Y. L.: The MD6 Hash Function - A Proposal to NIST for SHA-3. http:\/\/groups.csail.mit.edu\/cis\/md6\/"},{"key":"e_1_3_2_1_33_1","volume-title":"Standaert","author":"Renauld M.","year":"2009","unstructured":"Renauld , M. , Standaert , F. X. : Algebraic Side-Channel Attacks. IACR ePrint Archive, Report 2009 \/279 (2009), http:\/\/eprint.iacr.org\/2009\/279 Renauld, M., Standaert, F. X.: Algebraic Side-Channel Attacks. IACR ePrint Archive, Report 2009\/279 (2009), http:\/\/eprint.iacr.org\/2009\/279"},{"key":"e_1_3_2_1_34_1","first-page":"260","volume-title":"J. (Eds.) SECRYPT 2006","author":"Saarinen M.-J.O.","year":"2006","unstructured":"Saarinen , M.-J.O. : Chosen-IV Statistical Attacks on eStream Ciphers. In: Malek, M., Fernt'andez-Medina, E., Hernando , J. (Eds.) SECRYPT 2006 , pp. 260 -- 266 . INSTICC Press ( 2006 ) Saarinen, M.-J.O.: Chosen-IV Statistical Attacks on eStream Ciphers. In: Malek, M., Fernt'andez-Medina, E., Hernando, J. (Eds.) SECRYPT 2006, pp. 260--266. INSTICC Press (2006)"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-2694-0_23"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10433-6_25"}],"event":{"name":"ASIA CCS '11: 6th ACM Symposium on Information, Compuer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Hong Kong China","acronym":"ASIA CCS '11"},"container-title":["Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1966913.1966952","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1966913.1966952","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:25Z","timestamp":1750243945000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1966913.1966952"}},"subtitle":["enhancing the cube attack by extracting low-degree non-linear equations"],"short-title":[],"issued":{"date-parts":[[2011,3,22]]},"references-count":34,"alternative-id":["10.1145\/1966913.1966952","10.1145\/1966913"],"URL":"https:\/\/doi.org\/10.1145\/1966913.1966952","relation":{},"subject":[],"published":{"date-parts":[[2011,3,22]]},"assertion":[{"value":"2011-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}