Similar to dynamic cube attacks, the conditions used in conditional cube attacks are required to be dependent on both public bits and secret bits. A key step to a successful cube-like attack is the search of good cubes and the corresponding superpolys during a precomputation phase. When such ...