Skip to search formSkip to main contentSkip to account menu

Boomerang attack

Known as: Amplified boomerang cryptanalysis, Amplified boomerang attack, Boomerang cryptanalysis 
In cryptography, the boomerang attack is a method for the cryptanalysis of block ciphers based on differential cryptanalysis. The attack was… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
The boomerang uniformity is a safety index of S-boxes, which measures the resistance of block ciphers to the boomerang attack. In… 
2014
2014
SHA-2 (SHA-224, SHA-256, SHA-384 and SHA-512) is hash function family issued by the National Institute of Standards and… 
2014
2014
In this paper, we study the security margins of hash functions BLAKE and BLAKE2 against the boomerang attack. We launch boomerang… 
2013
2013
The cryptographic hash function SM3 is designed by X. Wang et al. and published by Chinese Commercial Cryptography Administration… 
2012
2012
In this paper we study boomerang attacks in the chosen-key setting. This is particularly relevant to hash function analysis… 
2011
2011
We present high probability differential trails on 2 and 3 rounds of BLAKE-32. Using the trails we are able to launch boomerang… 
2011
2011
In this paper, we study a boomerang attack approach on MD4-based hash functions, and present a practical 4-sum distinguisher… 
2008
2008
In this paper we present two new attacks on round reduced versions of the AES. We present the first application of the related… 
2008
2008
In spite of being replaced by AES (advanced encryption standard), DES (data encryption standard) still plays an important role as…