On the Boomerang Uniformity of Cryptographic Sboxes
The boomerang attack is a cryptanalysis technique against block ciphers which combines two differentials for the upper part and the lower part of the cipher. The dependency between these two differentials then highly affects the complexity of the attack and all its variants. Recently, Cid et al. in...
Main Authors: | Christina Boura, Anne Canteaut |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2018-09-01
|
Series: | IACR Transactions on Symmetric Cryptology |
Subjects: | |
Online Access: | https://tosc.iacr.org/index.php/ToSC/article/view/7304 |
Similar Items
-
Boomerang Connectivity Table Revisited. Application to SKINNY and AES
by: Ling Song, et al.
Published: (2019-03-01) -
On the Feistel Counterpart of the Boomerang Connectivity Table
by: Hamid Boukerrou, et al.
Published: (2020-05-01) -
Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys
by: Haoyang Wang, et al.
Published: (2019-03-01) -
Catching the Fastest Boomerangs
by: Stéphanie Delaune, et al.
Published: (2020-12-01) -
Catching the Fastest Boomerangs
by: Stéphanie Delaune, et al.
Published: (2020-12-01)