Boomerang switch in multiple rounds. Application to AES variants and deoxys
The boomerang attack is a cryptanalysis technique that allows an attacker to concatenate two short differential characteristics. Several research results (ladder switch, S-box switch, sandwich attack, Boomerang Connectivity Table (BCT), ...) showed that the dependency between these two characteristi...
Main Authors: | Wang, Haoyang, Peyrin, Thomas |
---|---|
Other Authors: | School of Physical and Mathematical Sciences |
Format: | Journal Article |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/104757 http://hdl.handle.net/10220/49459 |
Similar Items
-
Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys
by: Haoyang Wang, et al.
Published: (2019-03-01) -
Boomerang connectivity table revisited. Application to SKINNY and AES
by: Hu, Lei, et al.
Published: (2019) -
Boomerang Connectivity Table Revisited. Application to SKINNY and AES
by: Ling Song, et al.
Published: (2019-03-01) -
On the Boomerang Uniformity of Cryptographic Sboxes
by: Christina Boura, et al.
Published: (2018-09-01) -
A Formal Analysis of Boomerang Probabilities
by: Andreas B. Kidmose, et al.
Published: (2022-03-01)