The Return of the Cryptographic Boomerang
From MaRDI portal
Publication:5281010
DOI10.1109/TIT.2011.2111091zbMATH Open1366.94520OpenAlexW2145038746MaRDI QIDQ5281010FDOQ5281010
Authors: Sean Murphy
Publication date: 27 July 2017
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/tit.2011.2111091
Cited In (21)
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- Second order collision for the 42-step reduced DHA-256 hash function
- Boomerang Distinguisher for the SIMD-512 Compression Function
- Optimizing rectangle attacks: a unified and generic framework for key recovery
- Rectangle attacks on reduced versions of the FBC block cipher
- The retracing boomerang attack, with application to reduced-round AES
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
- Rotational-XOR differential rectangle cryptanalysis on \textsc{Simon}-like ciphers
- Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- The retracing boomerang attack
- Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation
- Truncated boomerang attacks and application to AES-based ciphers
- Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond
- Revisiting related-key boomerang attacks on AES using computer-aided tool
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
- Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery
- Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL
- Boomerang Attacks on Hash Function Using Auxiliary Differentials
- Generalized boomerang connectivity table and improved cryptanalysis of GIFT
This page was built for publication: The Return of the Cryptographic Boomerang
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5281010)