The Deoxys AEAD Family

J Jean, I Nikolić, T Peyrin, Y Seurin - Journal of Cryptology, 2021 - Springer
We present the Deoxys family of authenticated encryption schemes, which consists of
Deoxys-I and Deoxys-II. Both are nonce-based authenticated encryption schemes with …

Key guessing strategies for linear key-schedule algorithms in rectangle attacks

X Dong, L Qin, S Sun, X Wang - … on the Theory and Applications of …, 2022 - Springer
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we
find the right quartets which may suggest key candidates have to satisfy some nonlinear …

Truncated boomerang attacks and application to AES-based ciphers

A Bariant, G Leurent - Annual International Conference on the Theory and …, 2023 - Springer
The boomerang attack is a cryptanalysis technique that combines two short differentials
instead of using a single long differential. It has been applied to many primitives, and results …

Automated search oriented to key recovery on ciphers with linear key schedule: applications to boomerangs in SKINNY and ForkSkinny

L Qin, X Dong, X Wang, K Jia, Y Liu - IACR Transactions on Symmetric …, 2021 - tosc.iacr.org
Automatic modelling to search distinguishers with high probability covering as many rounds
as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis …

Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond

L Song, Q Yang, Y Chen, L Hu, J Weng - Annual International Conference …, 2024 - Springer
In differential-like attacks, the process typically involves extending a distinguisher forward
and backward with probability 1 for some rounds and recovering the key involved in the …

A generic algorithm for efficient key recovery in differential attacks–and its associated tool

C Boura, N David, P Derbez, R Heim Boissier… - … Conference on the …, 2024 - Springer
Differential cryptanalysis is an old and powerful attack against block ciphers. While different
techniques have been introduced throughout the years to improve the complexity of this …

Optimizing rectangle and boomerang attacks: A unified and generic framework for key recovery

Q Yang, L Song, N Zhang, D Shi, L Wang, J Zhao… - Journal of …, 2024 - Springer
The rectangle attack has shown to be a very powerful form of cryptanalysis against block
ciphers. Given a rectangle distinguisher, one expects to mount key recovery attacks as …

Optimizing rectangle attacks: a unified and generic framework for key recovery

L Song, N Zhang, Q Yang, D Shi, J Zhao, L Hu… - … Conference on the …, 2022 - Springer
The rectangle attack has shown to be a very powerful form of cryptanalysis against block
ciphers. Given a rectangle distinguisher, one expects to mount key recovery attacks as …

Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY

J Zhang, H Wang, D Tang - Cryptology ePrint Archive, 2024 - eprint.iacr.org
The impossible boomerang (IB) attack was first introduced by Lu in his doctoral thesis and
subsequently published at DCC in 2011. The IB attack is a variant of the impossible …

Automatic search of rectangle attacks on feistel ciphers: application to WARP

V Lallemand, M Minier, L Rouquette - IACR Transactions on …, 2022 - er.ceres.rub.de
In this paper we present a boomerang analysis of WARP, a recently proposed Generalized
Feistel Network with extremely compact hardware implementations. We start by looking for …