The retracing boomerang attack, with application to reduced-round AES
From MaRDI portal
Publication:6595850
DOI10.1007/S00145-024-09512-7zbMATH Open1546.9407MaRDI QIDQ6595850
Eyal Ronen, Orr Dunkelman, Adi Shamir, Nathan Keller
Publication date: 30 August 2024
Published in: Journal of Cryptology (Search for Journal in Brave)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
- Structural cryptanalysis of SASAS
- Probabilistic mixture differential cryptanalysis on round-reduced AES
- Differential cryptanalysis of DES-like cryptosystems
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
- Boomerang Connectivity Table: a new cryptanalysis tool
- Towards key-dependent integral and impossible differential distinguishers on 5-round AES
- Statistical integral distinguisher with multi-structure and its application on AES-like ciphers
- The retracing boomerang attack
- Practical attacks on reduced-round AES
- Mixcolumns properties and attacks on (round-reduced) AES with a single secret S-Box
- Yoyo tricks with AES
- Efficient slide attacks
- Cryptanalysis of Feistel Networks with Secret Round Functions
- New Insights on AES-Like SPN Ciphers
- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
- Security of the AES with a Secret S-Box
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- MixColumns Coefficient Property and Security of the AES with A Secret S-Box
- Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
- The Return of the Cryptographic Boomerang
- Information Security and Privacy
- Advanced Encryption Standard – AES
- Related-Key Boomerang and Rectangle Attacks
- Advances in Cryptology - CRYPTO 2003
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- Improved differential-linear attacks with applications to ARX ciphers
- Truncated boomerang attacks and application to AES-based ciphers
This page was built for publication: The retracing boomerang attack, with application to reduced-round AES
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6595850)