The Return of the Cryptographic Boomerang
From MaRDI portal
Publication:5281010
Cited in
(21)- Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
- Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL
- Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC
- The retracing boomerang attack
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- Optimizing rectangle attacks: a unified and generic framework for key recovery
- Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Boomerang Attacks on Hash Function Using Auxiliary Differentials
- Truncated boomerang attacks and application to AES-based ciphers
- Rotational-XOR differential rectangle cryptanalysis on \textsc{Simon}-like ciphers
- Second order collision for the 42-step reduced DHA-256 hash function
- Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery
- Boomerang Distinguisher for the SIMD-512 Compression Function
- Rectangle attacks on reduced versions of the FBC block cipher
- The retracing boomerang attack, with application to reduced-round AES
- Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
- Generalized boomerang connectivity table and improved cryptanalysis of GIFT
- Revisiting related-key boomerang attacks on AES using computer-aided tool
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
This page was built for publication: The Return of the Cryptographic Boomerang
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5281010)