Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
From MaRDI portal
Publication:6652909
DOI10.1007/978-3-031-68385-5_2MaRDI QIDQ6652909
Maria Eichlseder, Patrick Derbez, Hosein Hadipour
Publication date: 13 December 2024
\textsf{AES}\textsf{SKINNY}\textsf{KNOT}\textsf{Ascon}\textsf{LBlock}\textsf{PRESENT}\textsf{SERPENT}\textsf{Simeck}\textsf{TWINE}\textsf{WARP}\texttt{DDLCT}\texttt{DLCT}\texttt{EDLCT}\texttt{LDLCT}\texttt{UDLCT}differential-linear analysis
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Boomerang Connectivity Table: a new cryptanalysis tool
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
- Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette}
- Differential-linear cryptanalysis from an algebraic perspective
- Autocorrelations of vectorial Boolean functions
- Automatic search for bit-based division property
- Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- DLCT: a new tool for differential-linear cryptanalysis
- Differential-linear cryptanalysis revisited
- Cryptanalysis of Ascon
- Improved Differential-Linear Cryptanalysis of 7-Round Chaskey with Partitioning
- Differential-Linear Cryptanalysis of ICEPOLE
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- Enhancing Differential-Linear Cryptanalysis
- A Brief Comparison of Simon and Simeck
- Serpent: A New Block Cipher Proposal
- Advances in Cryptology – CRYPTO 2004
- Related-Key Differential-Linear Attacks on Reduced AES-192
- A Differential-Linear Attack on 12-Round Serpent
- Fast Software Encryption
- Fast Software Encryption
- Improved differential-linear attacks with applications to ARX ciphers
- Fully automated differential-linear attacks against ARX ciphers
- Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
- Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks
- Automated key recovery attacks on round-reduced Orthros
This page was built for publication: Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT