Revisiting related-key boomerang attacks on AES using computer-aided tool
From MaRDI portal
Publication:6135427
Recommendations
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- New Related-Key Boomerang Attacks on AES
- Key structures: improved related-key boomerang attack against the full AES-256
- Truncated boomerang attacks and application to AES-based ciphers
- Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
- Revisiting AES related-key differential attacks with constraint programming
- Related-key boomerang attacks on full ANU lightweight block cipher
- Advanced Encryption Standard – AES
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 1418251 (Why is no real title available?)
- Advanced Encryption Standard – AES
- Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
- Automatic search of attacks on round-reduced AES and applications
- Automatic search of meet-in-the-middle and impossible differential attacks
- Biclique Cryptanalysis of the Full AES
- Bicliques with minimal data and time complexity for AES
- Boomerang Connectivity Table: a new cryptanalysis tool
- Decorrelation: a theory for block cipher security
- Distinguisher and Related-Key Attack on the Full AES-256
- Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES
- Improved key recovery attacks on reduced-round AES in the single-key setting
- Improved single-key attacks on 9-round AES-192/256
- Improving the biclique cryptanalysis of AES
- Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- Related-key boomerang attacks on GIFT with automated trail search including BCT effect
- Revisiting AES related-key differential attacks with constraint programming
- The Delicate Issues of Addition with Respect to XOR Differences
- The Return of the Cryptographic Boomerang
- The retracing boomerang attack
Cited in
(6)- Boomerang Attacks on Hash Function Using Auxiliary Differentials
- Revisiting AES related-key differential attacks with constraint programming
- Improving the rectangle attack on GIFT-64
- Automatic boomerang attacks search on Rijndael
- A generic algorithm for efficient key recovery in differential attacks -- and its associated tool
- Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond
This page was built for publication: Revisiting related-key boomerang attacks on AES using computer-aided tool
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6135427)