Boomerang attack
Top View
- Analysis of RC2
- HIGHT: a New Block Cipher Suitable for Low-Resource Device *
- Cryptanalysis of Symmetric Cryptographic Primitives
- View the Index
- Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V
- Impossible Differential Cryptanalysis of Reduced Round Hight
- Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, and Nathan Keller
- A Advanced Encryption Standard See AES AES 35–64 AES Process And
- Analysis of MARS
- Elastic Block Ciphers: Method, Security and Instantiations
- Slide Attacks on a Class of Hash Functions
- Combined Attacks — from Boomerangs to Sandwiches and Differential-Linear
- Boomerang Uniformity of Popular S-Box Constructions
- Boomerang Attacks on Hash Function Using Auxiliary Differentials
- New Combined Attacks on Block Ciphers
- A Survey on the Cryptanalysis of the Advanced Encryption Standard
- The Rectangle Attack and Other Techniques for Cryptanalysis of Block Ciphers
- Conference Report THIRD ADVANCED ENCRYPTION