Automatic boomerang attacks search on Rijndael
From MaRDI portal
Publication:6193391
DOI10.1515/jmc-2023-0027MaRDI QIDQ6193391
Marine Minier, Loïc Rouquette, Christine Solnon
Publication date: 16 March 2024
Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)
Nonlinear programming (90C30) Combinatorial optimization (90C27) Cryptography (94A60) Data encryption (aspects in computer science) (68P25)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Improving impossible-differential attacks against Rijndael-160 and Rijndael-224
- Boomerang Connectivity Table: a new cryptanalysis tool
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Computing AES related-key differential characteristics with constraint programming
- On probability of success in linear and differential cryptanalysis
- On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks
- Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds
- Impossible-Differential Attacks on Large-Block Rijndael
- Improved Impossible Differential Attacks on Large-Block Rijndael
- Understanding Two-Round Differentials in AES
- Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
- Improved Impossible Differential Attacks on Large-Block Rijndael
- Related-Key Boomerang and Rectangle Attacks
- Revisiting related-key boomerang attacks on AES using computer-aided tool
- And Rijndael? Automatic related-key differential analysis of Rijndael
This page was built for publication: Automatic boomerang attacks search on Rijndael