Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery
From MaRDI portal
Publication:6536744
DOI10.1007/S00145-024-09499-1zbMATH Open1539.94031MaRDI QIDQ6536744FDOQ6536744
Authors: Qianqian Yang, Ling Song, Nana Zhang, Danping Shi, Libo Wang, Jiahao Zhao, Lei Hu, Jian Weng
Publication date: 13 May 2024
Published in: Journal of Cryptology (Search for Journal in Brave)
Recommendations
- Optimizing rectangle attacks: a unified and generic framework for key recovery
- scientific article; zbMATH DE number 2089123
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- A generic algorithm for efficient key recovery in differential attacks -- and its associated tool
- Generic framework for key-guessing improvements
boomerang attack\texttt{SKINNY}rectangle attack\texttt{CRAFT}key recovery algorithm\texttt{AES}-192\texttt{deoxys-BC}\texttt{Serpent}
Cites Work
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Title not available (Why is that?)
- Differential cryptanalysis of DES-like cryptosystems
- On probability of success in linear and differential cryptanalysis
- Title not available (Why is that?)
- Improved single-key attacks on 8-round AES-192 and AES-256
- Title not available (Why is that?)
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
- The Return of the Cryptographic Boomerang
- Related-Key Boomerang and Rectangle Attacks
- A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony
- Title not available (Why is that?)
- Title not available (Why is that?)
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- Observations on the \textsf{SIMON} block cipher family
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Boomerang Connectivity Table: a new cryptanalysis tool
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Programming the Demirci-Selçuk meet-in-the-middle attack with constraints
- Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD
- The retracing boomerang attack
- Improved single-key attacks on 8-round AES-192 and AES-256
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
Cited In (2)
This page was built for publication: Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6536744)