Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functions against boomerang attacks. Consequently, a cryptographic function is desired to have boomerang uniformity as low as its differential uniformity. Based on generalized butterfly structures recently introduced by Canteaut, Duval and Perrin, this paper presents infinite families of permutations of \({\mathbb {F}}_{2^{2n}}\) for a positive odd integer n, which have the best known nonlinearity and boomerang uniformity 4. Both open and closed butterfly structures are considered. The open butterflies, according to experimental results, appear not to produce permutations with boomerang uniformity 4. On the other hand, from the closed butterflies w...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
The article of record as published may be found at http://dx.doi.org/10.1109/TIT.2021.3123104The Dif...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functi...
The boomerang attack, introduced by Wagner in 1999, is a cryptanalysis technique against block ciphe...
Many block ciphers use permutations defined over the finite field F22k with low differential uniform...
Many block ciphers use permutations defined over the finite field F22k with low differential uniform...
Butterfly structure was proposed in CRYPTO 2016 [PUB16], and it can generate permutations ove
The boomerang attack, introduced by Wagner in 1999, is a cryptanalysis technique against block ciphe...
The boomerang attack is a cryptanalysis technique against block ciphers which combines two different...
International audienceThe boomerang attack is a cryptanalysis technique against block ciphers which ...
International audienceThe boomerang attack is a cryptanalysis technique against block ciphers which ...
Many block ciphers use permutations defined over the finite field $\mathbb{F}_{2^{2k}}$ with low dif...
International audienceThe boomerang attack is a cryptanalysis technique against block ciphers which ...
International audienceNonlinear functions, also called S-Boxes, are building blocks for symmetric cr...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
The article of record as published may be found at http://dx.doi.org/10.1109/TIT.2021.3123104The Dif...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functi...
The boomerang attack, introduced by Wagner in 1999, is a cryptanalysis technique against block ciphe...
Many block ciphers use permutations defined over the finite field F22k with low differential uniform...
Many block ciphers use permutations defined over the finite field F22k with low differential uniform...
Butterfly structure was proposed in CRYPTO 2016 [PUB16], and it can generate permutations ove
The boomerang attack, introduced by Wagner in 1999, is a cryptanalysis technique against block ciphe...
The boomerang attack is a cryptanalysis technique against block ciphers which combines two different...
International audienceThe boomerang attack is a cryptanalysis technique against block ciphers which ...
International audienceThe boomerang attack is a cryptanalysis technique against block ciphers which ...
Many block ciphers use permutations defined over the finite field $\mathbb{F}_{2^{2k}}$ with low dif...
International audienceThe boomerang attack is a cryptanalysis technique against block ciphers which ...
International audienceNonlinear functions, also called S-Boxes, are building blocks for symmetric cr...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
The article of record as published may be found at http://dx.doi.org/10.1109/TIT.2021.3123104The Dif...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...