A Bariant, G Leurent - Annual International Conference on the Theory and …, 2023 - Springer
The boomerang attack is a cryptanalysis technique that combines two short differentials instead of using a single long differential. It has been applied to many primitives, and results …
X Dong, L Qin, S Sun, X Wang - … on the Theory and Applications of …, 2022 - Springer
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we find the right quartets which may suggest key candidates have to satisfy some nonlinear …
We show that many symmetric cryptography primitives would not be less safe with significantly fewer rounds. To support this claim, we review the cryptanalysis progress in the …
In recent years, several MILP models were introduced to search automatically for boomerang distinguishers and boomerang attacks on block ciphers. However, they can only …
We present Orthros, a 128-bit block pseudorandom function. It is designed with primary focus on latency of fully unrolled circuits. For this purpose, we adopt a parallel structure …
M Rahman, D Saha, G Paul - IACR Transactions on Symmetric …, 2021 - er.ceres.rub.de
This work investigates a generic way of combining two very effective and well-studied cryptanalytic tools, proposed almost 18 years apart, namely the boomerang attack …
KD Muthavhine, M Sumbwanyambe - IEEE Access, 2023 - ieeexplore.ieee.org
Camellia is an encryption algorithm implemented in many Internet of Things (IoT) devices. However, intruders attack the Camellia cipher using Substitution Box (S-Box) distinguishers …
Boomerang attacks are extensions of differential attacks that make it possible to combine two unrelated differential properties of the first and second part of a cryptosystem with …
Q Yang, L Song, S Sun, D Shi, L Hu - IACR Transactions on Symmetric …, 2022 - tosc.iacr.org
The double boomerang connectivity table (DBCT) is a new table proposed recently to capture the behavior of two consecutive S-boxes in boomerang attacks. In this paper, we …