{"author_name":"smoking186","blog_title":"186 @ hatenablog","blog_url":"https://186.hatenablog.com/","image_url":null,"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2F186.hatenablog.com%2Fentry%2F20080915%2F1221470285\" title=\" Cube Attack - 186 @ hatenablog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","title":" Cube Attack","type":"rich","width":"100%","provider_url":"https://hatena.blog","height":"190","author_url":"https://blog.hatena.ne.jp/smoking186/","version":"1.0","published":"2008-09-15 18:18:05","provider_name":"Hatena Blog","url":"https://186.hatenablog.com/entry/20080915/1221470285","description":"Cryptology ePrint Archive: Report 2008/385 - I. Dinur, A. Shamir \u201cCube Attacks on Tweakable Black Box Polynomials\u201d Schneier\u5148\u751f\u304c\u5fa1\u57f7\u5fc3\u306e\u30a2\u30ec. \u6d41\u3057\u8aad\u307f\u3057\u305f\u9650\u308a\u3067\u306f, \u30d6\u30e9\u30c3\u30af\u30dc\u30c3\u30af\u30b9\u306b\u306a\u3063\u3066\u3044\u308bF_2\u4e0a\u306en\u5909\u6570d\u6b21\u591a\u9805\u5f0f\u3092\u3044\u304b\u306b\u3057\u3066\u6c42\u3081\u308b\u304b\u3068\u3044\u3046\u8a71\u3067\u3042\u3063\u305f. \u9069\u5f53\u306a\u4e8b\u524d\u8a08\u7b97\u3092\u6e08\u307e\u305b\u3066\u304a\u304f\u3068, O(2^{d-1} n + n^2)\u56de\u306e\u6f14\u7b97\u3067\u6c42\u307e\u308b\u3068\u304b\u306a\u3093\u3068\u304b. \u653b\u6483\u8005\u304c\u8a2d\u5b9a\u3067\u304d\u308b\u5909\u6570\u304ck (\uff1ed-1) \u500b\u3042\u308b. d-1\u6b21\u5143\u306e\u8d85\u7acb\u65b9\u4f53\u306e\u9802\u70b9\u30d9\u30af\u30c8\u30eb\u3092\u8003\u3048\u3066\u305d\u3053\u3067\u591a\u9805\u5f0f\u3092\u8a55\u4fa1\u2026","categories":["crypt"]}