Revisiting related-key boomerang attacks on AES using computer-aided tool
From MaRDI portal
Publication:6135427
DOI10.1007/978-3-031-22969-5_3zbMATH Open1519.94103OpenAlexW4317928179MaRDI QIDQ6135427FDOQ6135427
Authors: Patrick Derbez, Marie Euler, Pierre-Alain Fouque, Phuong Hoa Nguyen
Publication date: 25 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22969-5_3
Recommendations
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- New Related-Key Boomerang Attacks on AES
- Key structures: improved related-key boomerang attack against the full AES-256
- Truncated boomerang attacks and application to AES-based ciphers
- Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
- Revisiting AES related-key differential attacks with constraint programming
- Related-key boomerang attacks on full ANU lightweight block cipher
- Advanced Encryption Standard – AES
Cites Work
- Title not available (Why is that?)
- Biclique Cryptanalysis of the Full AES
- Distinguisher and Related-Key Attack on the Full AES-256
- Title not available (Why is that?)
- Decorrelation: a theory for block cipher security
- Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- The Return of the Cryptographic Boomerang
- Automatic search of attacks on round-reduced AES and applications
- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- Advanced Encryption Standard – AES
- The Delicate Issues of Addition with Respect to XOR Differences
- Boomerang Connectivity Table: a new cryptanalysis tool
- Related-key boomerang attacks on GIFT with automated trail search including BCT effect
- Bicliques with minimal data and time complexity for AES
- Improving the biclique cryptanalysis of AES
- Revisiting AES related-key differential attacks with constraint programming
- Improved single-key attacks on 9-round AES-192/256
- Improved key recovery attacks on reduced-round AES in the single-key setting
- Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES
- The retracing boomerang attack
- Automatic search of meet-in-the-middle and impossible differential attacks
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
Cited In (6)
- Revisiting AES related-key differential attacks with constraint programming
- Improving the rectangle attack on GIFT-64
- Automatic boomerang attacks search on Rijndael
- A generic algorithm for efficient key recovery in differential attacks -- and its associated tool
- Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond
- Boomerang Attacks on Hash Function Using Auxiliary Differentials
This page was built for publication: Revisiting related-key boomerang attacks on AES using computer-aided tool
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6135427)