Generalized boomerang connectivity table and improved cryptanalysis of GIFT
From MaRDI portal
Publication:6134020
DOI10.1007/978-3-031-26553-2_11zbMATH Open1519.94156MaRDI QIDQ6134020FDOQ6134020
Baofeng Wu, Chenmeng Li, Dongdai Lin
Publication date: 21 August 2023
Published in: Information Security and Cryptology (Search for Journal in Brave)
Recommendations
- Related-key boomerang attacks on GIFT with automated trail search including BCT effect
- Boomerang Connectivity Table: a new cryptanalysis tool
- Improved (related-key) differential cryptanalysis on GIFT
- A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis
- Boomerang uniformity of popular S-box constructions
Cites Work
- GIFT: A Small Present
- Differential cryptanalysis of DES-like cryptosystems
- Title not available (Why is that?)
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- The Return of the Cryptographic Boomerang
- A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony
- Title not available (Why is that?)
- Boomerang Connectivity Table: a new cryptanalysis tool
- Related-key boomerang attacks on GIFT with automated trail search including BCT effect
- MILP-based differential attack on round-reduced GIFT
- Improved (related-key) differential cryptanalysis on GIFT
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
Cited In (1)
This page was built for publication: Generalized boomerang connectivity table and improved cryptanalysis of GIFT
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6134020)