From another angle, our attack can be seen as a proof of concept, how far algebraic attacks can be pushed when several known techniques are combined into one implementation. All attacks have been fully implemented and tested; our figures are therefore not the result of any potentially error-prone extrapolation.
Category / Keywords: secret-key cryptography / Trivium, algebraic modelling, similar variables, ElimLin, sparse multivariate algebra, equation solving over $\F_2$ Date: received 29 Oct 2014, last revised 29 Oct 2014 Contact author: frank quedenfeld at googlemail com Available format(s): PDF | BibTeX Citation Note: pdf w/o name and e-mail adresse Version: 20141030:134053 (All versions of this report) Short URL: ia.cr/2014/893 Discussion forum: Show discussion | Start new discussion