New results about the boomerang uniformity of permutation polynomials

K Li, L Qu, B Sun, C Li - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
In EUROCRYPT 2018, Cid et al. introduced a new concept on the cryptographic property of
S-boxes: boomerang connectivity table (BCT for short) for evaluating the subtleties of …

On the boomerang uniformity of some permutation polynomials

M Calderini, I Villa - Cryptography and Communications, 2020 - Springer
The boomerang attack, introduced by Wagner in 1999, is a cryptanalysis technique against
block ciphers based on differential cryptanalysis. In particular it takes into consideration two …

On the boomerang uniformity of quadratic permutations

S Mesnager, C Tang, M Xiong - Designs, Codes and Cryptography, 2020 - Springer
Abstract At Eurocrypt'18, Cid, Huang, Peyrin, Sasaki, and Song introduced a new tool called
Boomerang Connectivity Table (BCT) for measuring the resistance of a block cipher against …

On the boomerang uniformity of cryptographic sboxes

C Boura, A Canteaut - IACR Transactions on Symmetric Cryptology, 2018 - tosc.iacr.org
The boomerang attack is a cryptanalysis technique against block ciphers which combines
two differentials for the upper part and the lower part of the cipher. The dependency between …

On the feistel counterpart of the boomerang connectivity table

H Boukerrou, P Huynh, V Lallemand… - IACR Transactions on …, 2020 - inria.hal.science
At Eurocrypt 2018, Cid et al. introduced the Boomerang Connectivity Table (BCT), a tool to
compute the probability of the middle round of a boomerang distinguisher from the …

A class of quadrinomial permutations with boomerang uniformity four

Z Tu, N Li, X Zeng, J Zhou - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
In Eurocrypt'18, Cid et al. proposed a new cryptanalysis tool called Boomerang Connectivity
Table (BCT), to evaluate S-boxes of block ciphers. Later, Boura and Canteaut further …

Boomerang connectivity table: a new cryptanalysis tool

C Cid, T Huang, T Peyrin, Y Sasaki, L Song - … , Tel Aviv, Israel, April 29-May …, 2018 - Springer
A boomerang attack is a cryptanalysis framework that regards a block cipher E as the
composition of two sub-ciphers E_1 ∘ E_0 E 1∘ E 0 and builds a particular characteristic for …

The c-Differential Uniformity and Boomerang Uniformity of Two Classes of Permutation Polynomials

SU Hasan, M Pal, P Stănică - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
The Difference Distribution Table (DDT) and the differential uniformity play a major role for
the design of substitution boxes in block ciphers, since they indicate the function's resistance …

Cryptographically strong permutations from the butterfly structure

K Li, C Li, T Helleseth, L Qu - Designs, Codes and Cryptography, 2021 - Springer
Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic
functions against boomerang attacks. Consequently, a cryptographic function is desired to …

Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the gold, and the Bracken-Leander S-boxes

S Eddahmani, S Mesnager - Cryptography and Communications, 2022 - Springer
The inverse, the Gold, and the Bracken-Leander functions are crucial for building S-boxes of
block ciphers with good cryptographic properties in symmetric cryptography. These functions …