Boomerang Connectivity Table: a new cryptanalysis tool

From MaRDI portal
Publication:1648856

DOI10.1007/978-3-319-78375-8_22zbMath1428.94065OpenAlexW2795355075MaRDI QIDQ1648856

Tao Huang, Yu Sasaki, Thomas Peyrin, Carlos Cid, Ling Song

Publication date: 9 July 2018

Full work available at URL: https://doi.org/10.1007/978-3-319-78375-8_22




Related Items (52)

Differential and boomerang spectrums of some power permutationsCryptographically strong permutations from the butterfly structureImproved (related-key) differential cryptanalysis on GIFTAn STP-based model toward designing S-boxes with good cryptographic propertiesOn the boomerang uniformity of permutations of low Carlitz rankOn the boomerang uniformity of a class of permutation quadrinomials over finite fieldsAutocorrelations of vectorial Boolean functionsPholkos -- efficient large-state tweakable block ciphers from the AES round functionSurvey on recent trends towards generalized differential and boomerang uniformitiesKey guessing strategies for linear key-schedule algorithms in rectangle attacksImproved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFTOn permutation quadrinomials with boomerang uniformity 4 and the best-known nonlinearityThe second-order zero differential spectra of almost perfect nonlinear functions and the inverse function in odd characteristicRotational-XOR differential rectangle cryptanalysis on \textsc{Simon}-like ciphersRotational differential-linear cryptanalysis revisitedTruncated boomerang attacks and application to AES-based ciphersKey structures: improved related-key boomerang attack against the full AES-256Two classes of power mappings with boomerang uniformity 2Using double Weil sums in finding the \(c\)-boomerang connectivity table for monomial functions on finite fieldsGeneralized boomerang connectivity table and improved cryptanalysis of GIFTMind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}Optimizing rectangle attacks: a unified and generic framework for key recoveryRevisiting related-key boomerang attacks on AES using computer-aided toolBoomerang uniformity of power permutations and algebraic curves over \(\mathbb{F}_{2^n}\)Boomerang uniformity of some classes of functions over finite fieldsOn perfect linear approximations and differentials over two-round SPNsThe \(c\)-differential uniformity and boomerang uniformity of three classes of permutation polynomials over \(\mathbb{F}_{2^n}\)A class of power mappings with low boomerang uniformityCompletely characterizing a class of permutation quadrinomialsOn CCZ-equivalence between the Bracken-Tan-Tan function and power functionsAutomatic boomerang attacks search on RijndaelBoomerang uniformity of popular S-box constructionsThe differential spectrum and boomerang spectrum of a class of locally-APN functionsDifferentially low uniform permutations from known 4-uniform functionsInvestigations on \(c\)-boomerang uniformity and perfect nonlinearityBoomerang uniformity of a class of power mapsCharacterizations and constructions of triple-cycle permutations of the form \(x^rh(x^s)\)On the boomerang uniformity of quadratic permutationsComputing AES related-key differential characteristics with constraint programmingOn the EA-classes of known APN functions in small dimensionsOn the boomerang uniformity of some permutation polynomialsLow \(c\)-differential and \(c\)-boomerang uniformity of the swapped inverse functionThe \texttt{Deoxys} AEAD familyThe retracing boomerang attackRotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette}Further cryptographic properties of the multiplicative inverse functionBoomerang uniformity of normalized permutation polynomials of low degreeThe binary Gold function and its \(c\)-boomerang connectivity tableExplicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the Gold, and the Bracken-Leander S-boxesA note on ``Cryptographically strong permutations from the butterfly structureTNT: how to tweak a block cipher




This page was built for publication: Boomerang Connectivity Table: a new cryptanalysis tool