The boomerang attack, introduced by Wagner in 1999, is a cryptanalysis technique against block ciphers based on differential cryptanalysis. In particular it takes into consideration two differentials, one for the upper part of the cipher and one for the lower part, and it exploits the dependency of these two differentials. At Eurocrypt’18, Cid et al. introduced a new tool, called the Boomerang Connectivity Table (BCT), that permits to simplify this analysis. Next, Boura and Canteaut introduced an important parameter for cryptographic S-boxes called boomerang uniformity, that is the maximum value in the BCT. Very recently, the boomerang uniformity of some classes of permutations (in particular quadratic functions) have been studied by Li, Qu...
Functions with low differential uniformity can be used in a block cipher as S-boxes since they have ...
We defined in [21] a new multiplicative c-differential, and the corresponding c-differential uniform...
Differentially 4-uniform permutations on F22k with high nonlinearity are often chosen as Substitutio...
The boomerang attack, introduced by Wagner in 1999, is a cryptanalysis technique against block ciphe...
The boomerang attack is a cryptanalysis technique against block ciphers which combines two different...
International audienceThe boomerang attack is a cryptanalysis technique against block ciphers which ...
International audienceThe boomerang attack is a cryptanalysis technique against block ciphers which ...
International audienceThe boomerang attack is a cryptanalysis technique against block ciphers which ...
The article of record as published may be found at http://dx.doi.org/10.1109/TIT.2021.3123104The Dif...
Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functi...
The boomerang attack is a cryptanalysis technique against block ciphers which combines two different...
Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functi...
17 USC 105 interim-entered record; under temporary embargo.Modifying the binary inverse function in ...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
Permutation polynomials with low $c$-differential uniformity and boomerang uniformity have wide appl...
Functions with low differential uniformity can be used in a block cipher as S-boxes since they have ...
We defined in [21] a new multiplicative c-differential, and the corresponding c-differential uniform...
Differentially 4-uniform permutations on F22k with high nonlinearity are often chosen as Substitutio...
The boomerang attack, introduced by Wagner in 1999, is a cryptanalysis technique against block ciphe...
The boomerang attack is a cryptanalysis technique against block ciphers which combines two different...
International audienceThe boomerang attack is a cryptanalysis technique against block ciphers which ...
International audienceThe boomerang attack is a cryptanalysis technique against block ciphers which ...
International audienceThe boomerang attack is a cryptanalysis technique against block ciphers which ...
The article of record as published may be found at http://dx.doi.org/10.1109/TIT.2021.3123104The Dif...
Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functi...
The boomerang attack is a cryptanalysis technique against block ciphers which combines two different...
Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functi...
17 USC 105 interim-entered record; under temporary embargo.Modifying the binary inverse function in ...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
Permutation polynomials with low $c$-differential uniformity and boomerang uniformity have wide appl...
Functions with low differential uniformity can be used in a block cipher as S-boxes since they have ...
We defined in [21] a new multiplicative c-differential, and the corresponding c-differential uniform...
Differentially 4-uniform permutations on F22k with high nonlinearity are often chosen as Substitutio...