Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the gold, and the Bracken-Leander S-boxes

S Eddahmani, S Mesnager - Cryptography and Communications, 2022 - Springer
The inverse, the Gold, and the Bracken-Leander functions are crucial for building S-boxes of
block ciphers with good cryptographic properties in symmetric cryptography. These functions …

On the boomerang uniformity of cryptographic sboxes

C Boura, A Canteaut - IACR Transactions on Symmetric Cryptology, 2018 - tosc.iacr.org
The boomerang attack is a cryptanalysis technique against block ciphers which combines
two differentials for the upper part and the lower part of the cipher. The dependency between …

In-depth analysis of S-boxes over binary finite fields concerning their differential and Feistel boomerang differential uniformities

Y Man, S Mesnager, N Li, X Zeng, X Tang - arXiv preprint arXiv …, 2023 - arxiv.org
Substitution boxes (S-boxes) play a significant role in ensuring the resistance of block
ciphers against various attacks. The Difference Distribution Table (DDT), the Feistel …

Boomerang uniformity of popular S-box constructions

C Boura, L Perrin, S Tian - WCC 2019-The Eleventh International …, 2019 - inria.hal.science
In order to study the resistance of a block cipher against boomerang attacks, a tool called the
Boomerang Connectivity Table (BCT) for S-boxes was recently introduced. Very little is …

On the feistel counterpart of the boomerang connectivity table

H Boukerrou, P Huynh, V Lallemand… - IACR Transactions on …, 2020 - inria.hal.science
At Eurocrypt 2018, Cid et al. introduced the Boomerang Connectivity Table (BCT), a tool to
compute the probability of the middle round of a boomerang distinguisher from the …

Boomerang uniformity of popular S-box constructions

S Tian, C Boura, L Perrin - Designs, Codes and Cryptography, 2020 - Springer
In order to study the resistance of a block cipher against boomerang attacks, a tool called the
Boomerang Connectivity Table (BCT) for S-boxes was recently introduced. Very little is …

On the boomerang uniformity of (quadratic) permutations over

S Mesnager, C Tang, M Xiong - arXiv preprint arXiv:1903.00501, 2019 - arxiv.org
At Eurocrypt'18, Cid, Huang, Peyrin, Sasaki, and Song introduced a new tool called
Boomerang Connectivity Table (BCT) for measuring the resistance of a block cipher against …

Boomerang connectivity table: a new cryptanalysis tool

C Cid, T Huang, T Peyrin, Y Sasaki, L Song - … , Tel Aviv, Israel, April 29-May …, 2018 - Springer
A boomerang attack is a cryptanalysis framework that regards a block cipher E as the
composition of two sub-ciphers E_1 ∘ E_0 E 1∘ E 0 and builds a particular characteristic for …

New properties of the double boomerang connectivity table

Q Yang, L Song, S Sun, D Shi, L Hu - IACR Transactions on Symmetric …, 2022 - tosc.iacr.org
The double boomerang connectivity table (DBCT) is a new table proposed recently to
capture the behavior of two consecutive S-boxes in boomerang attacks. In this paper, we …

Boomerang connectivity table revisited. application to SKINNY and AES

L Hu, L Song, X Qin - 2019 - dr.ntu.edu.sg
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher
E as the composition of two sub-ciphers, ie, E= E1◦ E0, and which constructs distinguishers …