Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
From MaRDI portal
Publication:6652909
DOI10.1007/978-3-031-68385-5_2MaRDI QIDQ6652909FDOQ6652909
Authors: Hosein Hadipour, Patrick Derbez, Maria Eichlseder
Publication date: 13 December 2024
Recommendations
\textsf{AES}\textsf{SKINNY}\textsf{KNOT}\textsf{Ascon}\textsf{LBlock}\textsf{PRESENT}\textsf{SERPENT}\textsf{Simeck}\textsf{TWINE}\textsf{WARP}\texttt{DDLCT}\texttt{DLCT}\texttt{EDLCT}\texttt{LDLCT}\texttt{UDLCT}differential-linear analysis
Cites Work
- DLCT: a new tool for differential-linear cryptanalysis
- Title not available (Why is that?)
- Title not available (Why is that?)
- Serpent: a new block cipher proposal
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Fast Software Encryption
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
- Differential-linear cryptanalysis from an algebraic perspective
- Differential-linear cryptanalysis revisited
- Enhancing Differential-Linear Cryptanalysis
- A Differential-Linear Attack on 12-Round Serpent
- Differential-linear cryptanalysis of Serpent.
- Related-Key Differential-Linear Attacks on Reduced AES-192
- Cryptanalysis of Ascon
- Advances in Cryptology – CRYPTO 2004
- Boomerang Connectivity Table: a new cryptanalysis tool
- WARP: revisiting GFN for lightweight 128-bit block cipher
- A brief comparison of SIMON and SIMECK
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
- Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette}
- Improved differential-linear cryptanalysis of 7-round Chaskey with partitioning
- Improved differential-linear attacks with applications to ARX ciphers
- Fully automated differential-linear attacks against ARX ciphers
- Autocorrelations of vectorial Boolean functions
- Automatic search for bit-based division property
- Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT
- Differential-linear cryptanalysis of ICEPOLE
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks
- Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
- Automated key recovery attacks on round-reduced Orthros
This page was built for publication: Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6652909)