Boomerang Connectivity Table: a new cryptanalysis tool
From MaRDI portal
Publication:1648856
DOI10.1007/978-3-319-78375-8_22zbMATH Open1428.94065OpenAlexW2795355075MaRDI QIDQ1648856FDOQ1648856
Authors: Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song
Publication date: 9 July 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-78375-8_22
Recommendations
- Generalized boomerang connectivity table and improved cryptanalysis of GIFT
- Boomerang uniformity of popular S-box constructions
- On the boomerang uniformity of quadratic permutations
- Related-key boomerang attacks on GIFT with automated trail search including BCT effect
- On the boomerang uniformity of some permutation polynomials
S-boxincompatibilityboomerang attackdeoxysdifferential distribution tableladder switchS-box switchskinny
Cited In (67)
- Rectangle attacks on reduced versions of the FBC block cipher
- The retracing boomerang attack, with application to reduced-round AES
- A further study on the Ness-Helleseth function
- On a relationship between linear and differential characteristics of binary vector spaces mappings and diffusion characteristics over blocks of imprimitivity systems of translation group of the binary vector space
- In-depth analysis of S-boxes over binary finite fields concerning their differential and Feistel boomerang differential uniformities
- On CCZ-equivalence between the Bracken-Tan-Tan function and power functions
- Quantum boomerang attacks and some applications
- Improving the rectangle attack on GIFT-64
- The \(c\)-boomerang uniformity of two classes of permutation polynomials over finite fields
- Automatic boomerang attacks search on Rijndael
- The explicit values of the UBCT, the LBCT and the DBCT of the inverse function
- Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond
- New approaches for estimating the bias of differential-linear distinguishers
- Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
- Further explorations in the second-order zero differential spectra of power functions over finite fields
- Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery
- Investigations on \(c\)-boomerang uniformity and perfect nonlinearity
- An STP-based model toward designing S-boxes with good cryptographic properties
- Computing AES related-key differential characteristics with constraint programming
- Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
- Boomerang uniformity of some classes of functions over finite fields
- Cryptographically strong permutations from the butterfly structure
- Improved (related-key) differential cryptanalysis on GIFT
- On the EA-classes of known APN functions in small dimensions
- On perfect linear approximations and differentials over two-round SPNs
- Characterizations and constructions of triple-cycle permutations of the form \(x^rh(x^s)\)
- A note on ``Cryptographically strong permutations from the butterfly structure
- TNT: how to tweak a block cipher
- Differentially low uniform permutations from known 4-uniform functions
- Differential and boomerang spectrums of some power permutations
- Optimizing rectangle attacks: a unified and generic framework for key recovery
- On the boomerang uniformity of some permutation polynomials
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Related-key boomerang attacks on GIFT with automated trail search including BCT effect
- On the boomerang uniformity of quadratic permutations
- Boomerang uniformity of popular S-box constructions
- On the boomerang uniformity of a class of permutation quadrinomials over finite fields
- Rotational-XOR differential rectangle cryptanalysis on \textsc{Simon}-like ciphers
- Autocorrelations of vectorial Boolean functions
- Two classes of power mappings with boomerang uniformity 2
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function
- Survey on recent trends towards generalized differential and boomerang uniformities
- Low \(c\)-differential and \(c\)-boomerang uniformity of the swapped inverse function
- The \texttt{Deoxys} AEAD family
- Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128
- The \(c\)-differential uniformity and boomerang uniformity of three classes of permutation polynomials over \(\mathbb{F}_{2^n}\)
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- The retracing boomerang attack
- Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette}
- Key structures: improved related-key boomerang attack against the full AES-256
- Truncated boomerang attacks and application to AES-based ciphers
- On permutation quadrinomials with boomerang uniformity 4 and the best-known nonlinearity
- Revisiting related-key boomerang attacks on AES using computer-aided tool
- The second-order zero differential spectra of almost perfect nonlinear functions and the inverse function in odd characteristic
- Further cryptographic properties of the multiplicative inverse function
- Boomerang uniformity of normalized permutation polynomials of low degree
- Using double Weil sums in finding the \(c\)-boomerang connectivity table for monomial functions on finite fields
- Rotational differential-linear cryptanalysis revisited
- On the boomerang uniformity of permutations of low Carlitz rank
- Boomerang uniformity of power permutations and algebraic curves over \(\mathbb{F}_{2^n}\)
- The binary Gold function and its \(c\)-boomerang connectivity table
- Completely characterizing a class of permutation quadrinomials
- A class of power mappings with low boomerang uniformity
- The differential spectrum and boomerang spectrum of a class of locally-APN functions
- Boomerang uniformity of a class of power maps
- Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the Gold, and the Bracken-Leander S-boxes
- Generalized boomerang connectivity table and improved cryptanalysis of GIFT
This page was built for publication: Boomerang Connectivity Table: a new cryptanalysis tool
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1648856)