Search
Search Results
-
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery
The rectangle attack has shown to be a very powerful form of cryptanalysis against block ciphers. Given a rectangle distinguisher, one expects to...
-
A Class of Power Map**s with Low Boomerang Uniformity
Let \(f(x)=x^{\frac{q-3}{2}}\) be a power... -
Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT
Boomerang connectivity table (BCT), an essential tool in boomerang attack, gives a unified description of the probability in the middle round of a... -
On the Evolution of Boomerang Uniformity in Cryptographic S-boxes
S-boxes are an important primitive that help cryptographic algorithms to be resilient against various attacks. The resilience against specific... -
Truncated Boomerang Attacks and Application to AES-Based Ciphers
The boomerang attack is a cryptanalysis technique that combines two short differentials instead of using a single long differential. It has been... -
Survey on recent trends towards generalized differential and boomerang uniformities
Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block and stream ciphers and cryptographic hash functions. The...
-
The binary Gold function and its c-boomerang connectivity table
Here, we give a complete description of the entire c -Boomerang Connectivity Table for the Gold function over finite fields of even characteristic, by...
-
Quantum Boomerang Attacks and Some Applications
In this paper, we study quantum key-recovery attacks on block ciphers. While it is well known that a quantum adversary can generically speed up an... -
Boomerang uniformity of a class of power maps
We consider the boomerang uniformity of an infinite class of (locally-APN) power maps and show that their boomerang uniformity over the finite field
... -
Differential and boomerang spectrums of some power permutations
The differential (resp. boomerang) spectrum is an important parameter to estimate the resistance of cryptographic functions against some variants of...
-
Parallel Validity Analysis of the Boomerang Attack Model
The boomerang attack is an extension of the differential attack that make it possible to theoretically construct a long quartet structured... -
Revisiting Related-Key Boomerang Attacks on AES Using Computer-Aided Tool
In recent years, several MILP models were introduced to search automatically for boomerang distinguishers and boomerang attacks on block ciphers.... -
Improved Boomerang Attacks on Deoxys-BC
In this paper, we present two techniques to improve the previous attack against the tweakable block cipher Deoxys-BC. First, we apply the idea of... -
On permutation quadrinomials with boomerang uniformity 4 and the best-known nonlinearity
Motivated by recent works on the butterfly structure, particularly by its generalization introduced by Canteaut et al. (IEEE Trans Inf Theory...
-
Boomerang uniformity of popular S-box constructions
In order to study the resistance of a block cipher against boomerang attacks, a tool called the Boomerang Connectivity Table (BCT) for S-boxes was...
-
On the boomerang uniformity of quadratic permutations
At Eurocrypt’18, Cid, Huang, Peyrin, Sasaki, and Song introduced a new tool called Boomerang Connectivity Table (BCT) for measuring the resistance of...
-
Key Structures: Improved Related-Key Boomerang Attack Against the Full AES-256
This paper introduces structure to key, in the related-key attack settings. While the idea of structure has been long used in key-recovery attacks... -
On the boomerang uniformity of some permutation polynomials
The boomerang attack, introduced by Wagner in 1999, is a cryptanalysis technique against block ciphers based on differential cryptanalysis. In...