We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 779 results
  1. Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery

    The rectangle attack has shown to be a very powerful form of cryptanalysis against block ciphers. Given a rectangle distinguisher, one expects to...

    Qianqian Yang, Ling Song, ... Jian Weng in Journal of Cryptology
    Article 10 April 2024
  2. A Class of Power Map**s with Low Boomerang Uniformity

    Let \(f(x)=x^{\frac{q-3}{2}}\) be a power...
    Haode Yan, Ziying Zhang, Zhengchun Zhou in Arithmetic of Finite Fields
    Conference paper 2023
  3. Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT

    Boomerang connectivity table (BCT), an essential tool in boomerang attack, gives a unified description of the probability in the middle round of a...
    Chenmeng Li, Baofeng Wu, Dongdai Lin in Information Security and Cryptology
    Conference paper 2023
  4. On the Evolution of Boomerang Uniformity in Cryptographic S-boxes

    S-boxes are an important primitive that help cryptographic algorithms to be resilient against various attacks. The resilience against specific...
    Marko Durasevic, Domagoj Jakobovic, ... Stjepan Picek in Applications of Evolutionary Computation
    Conference paper 2023
  5. Truncated Boomerang Attacks and Application to AES-Based Ciphers

    The boomerang attack is a cryptanalysis technique that combines two short differentials instead of using a single long differential. It has been...
    Augustin Bariant, Gaëtan Leurent in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  6. Survey on recent trends towards generalized differential and boomerang uniformities

    Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block and stream ciphers and cryptographic hash functions. The...

    Sihem Mesnager, Bimal Mandal, Mounira Msahli in Cryptography and Communications
    Article 03 December 2021
  7. The binary Gold function and its c-boomerang connectivity table

    Here, we give a complete description of the entire c -Boomerang Connectivity Table for the Gold function over finite fields of even characteristic, by...

    Sartaj Ul Hasan, Mohit Pal, Pantelimon Stănică in Cryptography and Communications
    Article 31 March 2022
  8. Quantum Boomerang Attacks and Some Applications

    In this paper, we study quantum key-recovery attacks on block ciphers. While it is well known that a quantum adversary can generically speed up an...
    Paul Frixons, María Naya-Plasencia, André Schrottenloher in Selected Areas in Cryptography
    Conference paper 2022
  9. Boomerang uniformity of a class of power maps

    We consider the boomerang uniformity of an infinite class of (locally-APN) power maps and show that their boomerang uniformity over the finite field ...

    Sartaj Ul Hasan, Mohit Pal, Pantelimon Stănică in Designs, Codes and Cryptography
    Article 15 September 2021
  10. Differential and boomerang spectrums of some power permutations

    The differential (resp. boomerang) spectrum is an important parameter to estimate the resistance of cryptographic functions against some variants of...

    Sha Jiang, Kangquan Li, ... Longjiang Qu in Cryptography and Communications
    Article 31 August 2021
  11. Parallel Validity Analysis of the Boomerang Attack Model

    The boomerang attack is an extension of the differential attack that make it possible to theoretically construct a long quartet structured...
    Pei Li, Liliu Tan, ... Jiageng Chen in Emerging Information Security and Applications
    Conference paper 2022
  12. Revisiting Related-Key Boomerang Attacks on AES Using Computer-Aided Tool

    In recent years, several MILP models were introduced to search automatically for boomerang distinguishers and boomerang attacks on block ciphers....
    Patrick Derbez, Marie Euler, ... Phuong Hoa Nguyen in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  13. Improved Boomerang Attacks on Deoxys-BC

    In this paper, we present two techniques to improve the previous attack against the tweakable block cipher Deoxys-BC. First, we apply the idea of...
    Jiahao Zhao, Nana Zhang, ... Lei Hu in Advances in Information and Computer Security
    Conference paper 2023
  14. On permutation quadrinomials with boomerang uniformity 4 and the best-known nonlinearity

    Motivated by recent works on the butterfly structure, particularly by its generalization introduced by Canteaut et al. (IEEE Trans Inf Theory...

    Kwang Ho Kim, Sihem Mesnager, ... Myong Chol Jo in Designs, Codes and Cryptography
    Article 07 May 2022
  15. Boomerang uniformity of popular S-box constructions

    In order to study the resistance of a block cipher against boomerang attacks, a tool called the Boomerang Connectivity Table (BCT) for S-boxes was...

    Shizhu Tian, Christina Boura, Léo Perrin in Designs, Codes and Cryptography
    Article 14 August 2020
  16. On the boomerang uniformity of quadratic permutations

    At Eurocrypt’18, Cid, Huang, Peyrin, Sasaki, and Song introduced a new tool called Boomerang Connectivity Table (BCT) for measuring the resistance of...

    Sihem Mesnager, Chunming Tang, Maosheng **ong in Designs, Codes and Cryptography
    Article 18 June 2020
  17. Key Structures: Improved Related-Key Boomerang Attack Against the Full AES-256

    This paper introduces structure to key, in the related-key attack settings. While the idea of structure has been long used in key-recovery attacks...
    Jian Guo, Ling Song, Haoyang Wang in Information Security and Privacy
    Conference paper 2022
  18. On the boomerang uniformity of some permutation polynomials

    The boomerang attack, introduced by Wagner in 1999, is a cryptanalysis technique against block ciphers based on differential cryptanalysis. In...

    Marco Calderini, Irene Villa in Cryptography and Communications
    Article Open access 11 June 2020
Did you find what you were looking for? Share feedback.