International audienceIn order to study the resistance of a block cipher against boomerang attacks, a tool called the Boomerang Connectivity Table (BCT) for S-boxes was recently introduced. Very little is known today about the properties of this table especially for bijective S-boxes defined for n variables with n ≡ 0 mod 4. In this work we study the boomerang uniformity of some popular constructions used for building large S-boxes, e.g. for 8 variables, from smaller ones. We show that the BCTs of all the studied constructions have abnormally high values in some positions. This remark permits us in some cases to link the boomerang properties of an S-box with other well-known cryptanalytic techniques on such constructions while in other case...
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as th...
The double boomerang connectivity table (DBCT) is a new table proposed recently to capture the behav...
Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functi...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
The boomerang attack is a cryptanalysis technique against block ciphers which combines two different...
International audienceThe boomerang attack is a cryptanalysis technique against block ciphers which ...
International audienceThe boomerang attack is a cryptanalysis technique against block ciphers which ...
International audienceThe boomerang attack is a cryptanalysis technique against block ciphers which ...
Abstract. The aim of this work is to find large S-Boxes, typically operating on 8 bits, having both ...
S-boxes are an important primitive that help cryptographic algorithms to be resilient against variou...
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as th...
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as th...
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as th...
The double boomerang connectivity table (DBCT) is a new table proposed recently to capture the behav...
Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functi...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
The boomerang attack is a cryptanalysis technique against block ciphers which combines two different...
International audienceThe boomerang attack is a cryptanalysis technique against block ciphers which ...
International audienceThe boomerang attack is a cryptanalysis technique against block ciphers which ...
International audienceThe boomerang attack is a cryptanalysis technique against block ciphers which ...
Abstract. The aim of this work is to find large S-Boxes, typically operating on 8 bits, having both ...
S-boxes are an important primitive that help cryptographic algorithms to be resilient against variou...
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as th...
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as th...
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as th...
The double boomerang connectivity table (DBCT) is a new table proposed recently to capture the behav...
Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functi...