Boomerang connectivity table revisited. Application to SKINNY and AES
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as the composition of two sub-ciphers, i.e., E = E1o E0, and which constructs distinguishers for E with probability p2q2 by combining differential trails for E0 and E1 with probability p and q respectively...
Saved in:
Main Authors: | Hu, Lei, Song, Ling, Qin, Xianrui |
---|---|
Other Authors: | School of Physical and Mathematical Sciences |
Format: | Article |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/104754 http://hdl.handle.net/10220/49464 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Boomerang switch in multiple rounds. Application to AES variants and deoxys
by: Wang, Haoyang, et al.
Published: (2019) -
High Security RF Remote Controller
by: Pham, Manh Thang, et al.
Published: (2017) -
Towards closing the security gap of Tweak-aNd-Tweak (TNT)
by: Guo, Chun, et al.
Published: (2021) -
Security of COFB against chosen ciphertext attacks
by: Khairallah, Mustafa
Published: (2022) -
Light-Weight Encryption Schemes for Multimedia Data
by: BAO, Feng, et al.
Published: (2007)