Cube attack
Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18
31
MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes
18
Conditional Cube Attack on Round-Reduced River Keyak
12
Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN
22
A Dynamic Cube Attack on $105$ round Grain v1
27
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP
32
Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function
22
Applications of Key Recovery Cube-attack-like
20
SMT-based Cube Attack on Simeck32/64
17
Algebraic Properties of the Cube Attack
41
Cube attacks on cryptographic hash functions
66
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices
13
Analysis, Correlation, and Estimation for Control of Material Properties
25
Reliable, Effective and Fault Tolerant Design of Leafy Cube Interconnection Network Topology
8
COMPARATIVE STUDY OF SPHERICAL BUBBLE INFUSED CUBE AND NORMAL CUBE
8
The Lilac Cube
187
A Cube as form
26
Overview of Rubik’s Cube and Reflections on Its Application in Mechanism
12
Cube difference labeling of some helm and wheel related graphs
10
Cube Summing, Approximate Inference with Non Local Features, and Dynamic Programming without Semirings
9