Revisiting related-key boomerang attacks on AES using computer-aided tool
From MaRDI portal
Publication:6135427
DOI10.1007/978-3-031-22969-5_3zbMath1519.94103OpenAlexW4317928179MaRDI QIDQ6135427
Marie Euler, Patrick Derbez, Phuong Hoa Nguyen, Pierre-Alain Fouque
Publication date: 25 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22969-5_3
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Boomerang Connectivity Table: a new cryptanalysis tool
- Revisiting AES related-key differential attacks with constraint programming
- Decorrelation: a theory for block cipher security
- The retracing boomerang attack
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- Related-key boomerang attacks on GIFT with automated trail search including BCT effect
- Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
- Bicliques with Minimal Data and Time Complexity for AES
- Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES
- Improved Single-Key Attacks on 9-Round AES-192/256
- Biclique Cryptanalysis of the Full AES
- Distinguisher and Related-Key Attack on the Full AES-256
- Improving the Biclique Cryptanalysis of AES
- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Automatic Search of Attacks on Round-Reduced AES and Applications
- The Return of the Cryptographic Boomerang
- Advanced Encryption Standard – AES
- The Delicate Issues of Addition with Respect to XOR Differences
This page was built for publication: Revisiting related-key boomerang attacks on AES using computer-aided tool