Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
From MaRDI portal
Publication:5271860
DOI10.1109/TIT.2012.2191655zbMath1365.94438OpenAlexW2100510009MaRDI QIDQ5271860
Bart Preneel, Orr Dunkelman, Eli Biham, Seokhie Hong, Jongsung Kim, Nathan Keller
Publication date: 12 July 2017
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/tit.2012.2191655
Related Items
The second-order zero differential spectra of almost perfect nonlinear functions and the inverse function in odd characteristic ⋮ Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation ⋮ Key structures: improved related-key boomerang attack against the full AES-256 ⋮ Using double Weil sums in finding the \(c\)-boomerang connectivity table for monomial functions on finite fields ⋮ Practical-time related-key attack on GOST with secret S-boxes ⋮ A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony ⋮ Investigations on \(c\)-boomerang uniformity and perfect nonlinearity ⋮ On the boomerang uniformity of quadratic permutations ⋮ Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA ⋮ Low \(c\)-differential and \(c\)-boomerang uniformity of the swapped inverse function ⋮ On Related-Key Attacks and KASUMI: The Case of A5/3