The retracing boomerang attack
From MaRDI portal
Publication:2055612
DOI10.1007/978-3-030-45721-1_11zbMath1479.94163OpenAlexW2982416332MaRDI QIDQ2055612
Orr Dunkelman, Adi Shamir, Eyal Ronen, Nathan Keller
Publication date: 1 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-45721-1_11
Related Items (6)
Mixture integral attacks on reduced-round AES with a known/secret S-box ⋮ Key guessing strategies for linear key-schedule algorithms in rectangle attacks ⋮ Structural evaluation of AES-like ciphers against mixture differential cryptanalysis ⋮ Truncated boomerang attacks and application to AES-based ciphers ⋮ On the primitivity of the AES-128 key-schedule ⋮ Revisiting related-key boomerang attacks on AES using computer-aided tool
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
- Structural cryptanalysis of SASAS
- Probabilistic mixture differential cryptanalysis on round-reduced AES
- Differential cryptanalysis of DES-like cryptosystems
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
- Boomerang Connectivity Table: a new cryptanalysis tool
- Towards key-dependent integral and impossible differential distinguishers on 5-round AES
- Statistical integral distinguisher with multi-structure and its application on AES-like ciphers
- Practical attacks on reduced-round AES
- Mixcolumns properties and attacks on (round-reduced) AES with a single secret S-Box
- Yoyo tricks with AES
- Cryptanalysis of Feistel Networks with Secret Round Functions
- New Insights on AES-Like SPN Ciphers
- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
- Security of the AES with a Secret S-Box
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- The Return of the Cryptographic Boomerang
- Advances in Cryptology - CRYPTO 2003
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
This page was built for publication: The retracing boomerang attack