Boomerang Connectivity Table: a new cryptanalysis tool
From MaRDI portal
Publication:1648856
DOI10.1007/978-3-319-78375-8_22zbMath1428.94065OpenAlexW2795355075MaRDI QIDQ1648856
Tao Huang, Yu Sasaki, Thomas Peyrin, Carlos Cid, Ling Song
Publication date: 9 July 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-78375-8_22
incompatibilityS-boxboomerang attackdeoxysdifferential distribution tableladder switchS-box switchskinny
Related Items (52)
Differential and boomerang spectrums of some power permutations ⋮ Cryptographically strong permutations from the butterfly structure ⋮ Improved (related-key) differential cryptanalysis on GIFT ⋮ An STP-based model toward designing S-boxes with good cryptographic properties ⋮ On the boomerang uniformity of permutations of low Carlitz rank ⋮ On the boomerang uniformity of a class of permutation quadrinomials over finite fields ⋮ Autocorrelations of vectorial Boolean functions ⋮ Pholkos -- efficient large-state tweakable block ciphers from the AES round function ⋮ Survey on recent trends towards generalized differential and boomerang uniformities ⋮ Key guessing strategies for linear key-schedule algorithms in rectangle attacks ⋮ Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128 ⋮ Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT ⋮ On permutation quadrinomials with boomerang uniformity 4 and the best-known nonlinearity ⋮ The second-order zero differential spectra of almost perfect nonlinear functions and the inverse function in odd characteristic ⋮ Rotational-XOR differential rectangle cryptanalysis on \textsc{Simon}-like ciphers ⋮ Rotational differential-linear cryptanalysis revisited ⋮ Truncated boomerang attacks and application to AES-based ciphers ⋮ Key structures: improved related-key boomerang attack against the full AES-256 ⋮ Two classes of power mappings with boomerang uniformity 2 ⋮ Using double Weil sums in finding the \(c\)-boomerang connectivity table for monomial functions on finite fields ⋮ Generalized boomerang connectivity table and improved cryptanalysis of GIFT ⋮ Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} ⋮ Optimizing rectangle attacks: a unified and generic framework for key recovery ⋮ Revisiting related-key boomerang attacks on AES using computer-aided tool ⋮ Boomerang uniformity of power permutations and algebraic curves over \(\mathbb{F}_{2^n}\) ⋮ Boomerang uniformity of some classes of functions over finite fields ⋮ On perfect linear approximations and differentials over two-round SPNs ⋮ The \(c\)-differential uniformity and boomerang uniformity of three classes of permutation polynomials over \(\mathbb{F}_{2^n}\) ⋮ A class of power mappings with low boomerang uniformity ⋮ Completely characterizing a class of permutation quadrinomials ⋮ On CCZ-equivalence between the Bracken-Tan-Tan function and power functions ⋮ Automatic boomerang attacks search on Rijndael ⋮ Boomerang uniformity of popular S-box constructions ⋮ The differential spectrum and boomerang spectrum of a class of locally-APN functions ⋮ Differentially low uniform permutations from known 4-uniform functions ⋮ Investigations on \(c\)-boomerang uniformity and perfect nonlinearity ⋮ Boomerang uniformity of a class of power maps ⋮ Characterizations and constructions of triple-cycle permutations of the form \(x^rh(x^s)\) ⋮ On the boomerang uniformity of quadratic permutations ⋮ Computing AES related-key differential characteristics with constraint programming ⋮ On the EA-classes of known APN functions in small dimensions ⋮ On the boomerang uniformity of some permutation polynomials ⋮ Low \(c\)-differential and \(c\)-boomerang uniformity of the swapped inverse function ⋮ The \texttt{Deoxys} AEAD family ⋮ The retracing boomerang attack ⋮ Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette} ⋮ Further cryptographic properties of the multiplicative inverse function ⋮ Boomerang uniformity of normalized permutation polynomials of low degree ⋮ The binary Gold function and its \(c\)-boomerang connectivity table ⋮ Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the Gold, and the Bracken-Leander S-boxes ⋮ A note on ``Cryptographically strong permutations from the butterfly structure ⋮ TNT: how to tweak a block cipher
This page was built for publication: Boomerang Connectivity Table: a new cryptanalysis tool