Boomerang switch in multiple rounds. Application to AES variants and deoxys
The boomerang attack is a cryptanalysis technique that allows an attacker to concatenate two short differential characteristics. Several research results (ladder switch, S-box switch, sandwich attack, Boomerang Connectivity Table (BCT), ...) showed that the dependency between these two characteristi...
Saved in:
Main Authors: | Wang, Haoyang, Peyrin, Thomas |
---|---|
Other Authors: | School of Physical and Mathematical Sciences |
Format: | Article |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/104757 http://hdl.handle.net/10220/49459 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Boomerang connectivity table revisited. Application to SKINNY and AES
by: Hu, Lei, et al.
Published: (2019) -
Exploring integrity of AEADs with faults: definitions and constructions
by: Saha, Sayandeep, et al.
Published: (2023) -
The Deoxys AEAD family
by: Jean, Jérémy, et al.
Published: (2022) -
Improved meet-in-the-middle Nostradamus attacks on AES-like hashing
by: Dong, Xiaoyang, et al.
Published: (2024) -
Interceptive side channel attack on AES-128 wireless communications for IoT applications
by: Pammu, Ali Akbar, et al.
Published: (2017)