The Return of the Cryptographic Boomerang
From MaRDI portal
Publication:5281010
DOI10.1109/TIT.2011.2111091zbMath1366.94520OpenAlexW2145038746MaRDI QIDQ5281010
Publication date: 27 July 2017
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/tit.2011.2111091
Related Items (17)
Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL ⋮ Boomerang Attacks on Hash Function Using Auxiliary Differentials ⋮ Key guessing strategies for linear key-schedule algorithms in rectangle attacks ⋮ Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT ⋮ Rotational-XOR differential rectangle cryptanalysis on \textsc{Simon}-like ciphers ⋮ Truncated boomerang attacks and application to AES-based ciphers ⋮ Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation ⋮ Generalized boomerang connectivity table and improved cryptanalysis of GIFT ⋮ Optimizing rectangle attacks: a unified and generic framework for key recovery ⋮ Revisiting related-key boomerang attacks on AES using computer-aided tool ⋮ Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC ⋮ Second order collision for the 42-step reduced DHA-256 hash function ⋮ A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony ⋮ The (related-key) impossible boomerang attack and its application to the AES block cipher ⋮ Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA ⋮ The retracing boomerang attack ⋮ Boomerang Distinguisher for the SIMD-512 Compression Function
This page was built for publication: The Return of the Cryptographic Boomerang