{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:19:26Z","timestamp":1740147566158,"version":"3.37.3"},"reference-count":19,"publisher":"Institution of Engineering and Technology (IET)","issue":"4","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672533"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61521003"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Information Security"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1049\/iet-ifs.2019.0323","type":"journal-article","created":{"date-parts":[[2020,2,7]],"date-time":"2020-02-07T02:20:41Z","timestamp":1581042041000},"page":"430-441","source":"Crossref","is-referenced-by-count":13,"title":["Algebraic method to recover superpolies in cube attacks"],"prefix":"10.1049","volume":"14","author":[{"given":"Chen\u2010Dong","family":"Ye","sequence":"first","affiliation":[{"name":"PLA Strategic Support Force Information Engineering UniversityZhengzhou450001People's Republic of China"}]},{"given":"Tian","family":"Tian","sequence":"additional","affiliation":[{"name":"PLA Strategic Support Force Information Engineering UniversityZhengzhou450001People's Republic of China"}]}],"member":"265","published-online":{"date-parts":[[2020,7]]},"reference":[{"key":"e_1_2_7_2_2","doi-asserted-by":"crossref","unstructured":"Dinur I. Shamir A.: \u2018Cube attacks on tweakable black box polynomials\u2019.Proc. Advances in Cryptology \u2013 EUROCRYPT 2009 Germany April2009 pp.278\u2013299","DOI":"10.1007\/978-3-642-01001-9_16"},{"key":"e_1_2_7_3_2","doi-asserted-by":"crossref","unstructured":"Aumasson J. Dinur I. Meier W.et al: \u2018Cube testers and key recovery attacks on reduced\u2010round MD6 and Trivium\u2019.Proc. Fast Software Encryption \u2013 16th Int. Workshop FSE 2009 Leuven Belgium February2009 pp.1\u201322","DOI":"10.1007\/978-3-642-03317-9_1"},{"key":"e_1_2_7_4_2","doi-asserted-by":"crossref","unstructured":"Dinur I. Shamir A.: \u2018Breaking grain\u2010128 with dynamic cube attacks\u2019.Proc. Fast Software Encryption \u2013 18th Int. Workshop FSE 2011 Lyngby Denmark February2011 pp.167\u2013187","DOI":"10.1007\/978-3-642-21702-9_10"},{"key":"e_1_2_7_5_2","doi-asserted-by":"crossref","unstructured":"Huang S. Wang X. Xu G.et al: \u2018Conditional cube attack on reduced\u2010round keccak sponge function\u2019.Proc. Advances in Cryptology \u2013 EUROCRYPT 2017 Paris France April2017 pp.259\u2013288","DOI":"10.1007\/978-3-319-56614-6_9"},{"key":"e_1_2_7_6_2","doi-asserted-by":"crossref","unstructured":"Li Z. Bi W. Dong X.et al: \u2018Improved conditional cube attacks on keccak keyed modes with MILP method\u2019.Proc. Advances in Cryptology \u2013 ASIACRYPT 2017 Hong Kong China December2017 Proceedings Part I pp.99\u2013127","DOI":"10.1007\/978-3-319-70694-8_4"},{"key":"e_1_2_7_7_2","doi-asserted-by":"crossref","unstructured":"Todo Y. Isobe T. Hao Y.et al: \u2018Cube attacks on non\u2010blackbox polynomials based on division property\u2019.Proc. Advances in Cryptology \u2013 CRYPTO 2017 Santa Barbara CA USA August2017 pp.250\u2013279","DOI":"10.1007\/978-3-319-63697-9_9"},{"key":"e_1_2_7_8_2","doi-asserted-by":"crossref","unstructured":"Wang Q. Hao Y. Todo Y.et al: \u2018Improved division property based cube attacks exploiting algebraic properties of superpoly\u2019.Proc. Advances in Cryptology \u2013 CRYPTO 2018 Santa Barbara CA USA August2018 pp.275\u2013305","DOI":"10.1007\/978-3-319-96884-1_10"},{"key":"e_1_2_7_9_2","doi-asserted-by":"crossref","unstructured":"Liu M. Yang J. Wang W.et al: \u2018Correlation cube attacks: from weak\u2010key distinguisher to key recovery\u2019.Proc. Advances in Cryptology \u2013 EUROCRYPT 2018 Tel Aviv Israel April2018 pp.715\u2013744","DOI":"10.1007\/978-3-319-78375-8_23"},{"key":"e_1_2_7_10_2","unstructured":"Mroczkowski P. Szmidt J.: \u2018Corrigendum to: the cube attack on stream cipher Trivium and quadraticity tests\u2019 Cryptology ePrint Archive Report 2011\/032 2011. Available athttp:\/\/eprint.iacr.org\/2011\/032"},{"key":"e_1_2_7_11_2","doi-asserted-by":"crossref","unstructured":"Fouque P. Vannet T.: \u2018Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks\u2019.Proc. Fast Software Encryption \u2013 20th Int. Workshop FSE 2013 Singapore March2013 pp.502\u2013517","DOI":"10.1007\/978-3-662-43933-3_26"},{"key":"e_1_2_7_12_2","doi-asserted-by":"crossref","unstructured":"Ye C. Tian T.: \u2018A new framework for finding nonlinear superpolies in cube attacks against Trivium\u2010like ciphers\u2019.Proc. Information Security and Privacy \u2013 23rd Australasian Conf. ACISP 2018 Wollongong NSW Australia July2018(LNCS 10946) pp.172\u2013187","DOI":"10.1007\/978-3-319-93638-3_11"},{"key":"e_1_2_7_13_2","unstructured":"Wang S. Hu B. Guan J.et al: \u2018A practical method to recover exact superpoly in cube attack\u2019. Cryptology ePrint Archive Report 2019\/259 2019. Available athttps:\/\/eprint.iacr.org\/2019\/259"},{"issue":"3","key":"e_1_2_7_14_2","doi-asserted-by":"crossref","first-page":"81","DOI":"10.46586\/tosc.v2019.i3.81-102","article-title":"Revisit division property based cube attacks: key\u2010recovery or distinguishing attacks?","volume":"2019","author":"Ye C.","year":"2019","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"e_1_2_7_15_2","doi-asserted-by":"crossref","unstructured":"Fu X. Wang X. Dong X.et al: \u2018A key\u2010recovery attack on 855\u2010round Trivium\u2019.Proc. Advances in Cryptology \u2013 CRYPTO 2018 Santa Barbara CA USA August2018 pp.160\u2013184","DOI":"10.1007\/978-3-319-96881-0_6"},{"key":"e_1_2_7_16_2","unstructured":"Hao Y. Jiao L. Li C.et al: \u2018Observations on the dynamic cube attack of 855\u2010round Trivium from Crypto'18\u2019. Cryptology ePrint Archive Report 2018\/972 2018. Available athttps:\/\/eprint.iacr.org\/2018\/972"},{"issue":"12","key":"e_1_2_7_17_2","doi-asserted-by":"crossref","first-page":"1720","DOI":"10.1109\/TC.2018.2835480","article-title":"Cube attacks on non\u2010blackbox polynomials based on division property","volume":"67","author":"Todo Y.","year":"2018","journal-title":"IEEE Trans. Comput."},{"key":"e_1_2_7_18_2","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1007\/978-3-540-68351-3_18","volume-title":"New stream cipher designs \u2013 The eSTREAM finalists (lecture notes in computer science 4986)","author":"Canni\u00e8re C.D.","year":"2008"},{"key":"e_1_2_7_19_2","doi-asserted-by":"crossref","unstructured":"Liu M.: \u2018Degree evaluation of NFSR\u2010based cryptosystems\u2019.Proc. Advances in Cryptology \u2013 CRYPTO 2017 Santa Barbara CA USA August2017 pp.227\u2013249","DOI":"10.1007\/978-3-319-63697-9_8"},{"key":"e_1_2_7_20_2","unstructured":"Fu X. Wang X. Chen J.: \u2018Determining the nonexistent terms of non\u2010linear multivariate polynomials: how to break grain\u2010128\u00a0more efficiently\u2019 Cryptology ePrint Archive Report 2017\/412 2017. Available athttp:\/\/eprint.iacr.org\/2017\/412"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ifs.2019.0323","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-ifs.2019.0323","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ifs.2019.0323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T01:37:27Z","timestamp":1610588247000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-ifs.2019.0323"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["10.1049\/iet-ifs.2019.0323"],"URL":"https:\/\/doi.org\/10.1049\/iet-ifs.2019.0323","archive":["Portico"],"relation":{},"ISSN":["1751-8717","1751-8717"],"issn-type":[{"type":"print","value":"1751-8717"},{"type":"electronic","value":"1751-8717"}],"subject":[],"published":{"date-parts":[[2020,7]]}}}