Filters








794 Hits in 1.8 sec

Boomerang Connectivity Table Revisited. Application to SKINNY and AES

Ling Song, Xianrui Qin, Lei Hu
2019 IACR Transactions on Symmetric Cryptology  
Recently, Cid et al. proposed the Boomerang Connectivity Table (BCT) which unifies the previous switch techniques and incompatibility together and evaluates the probability of Em theoretically when Em  ...  In this paper, we revisit the BCT and propose a generalized framework which is able to identify the actual boundaries of Em which contains dependency of the two differential trails and systematically evaluate  ...  Boomerang Connectivity Table We introduce here the definitions and propositions related to the boomerang connectivity table of S-box S : F n 2 → F n 2 .  ... 
doi:10.46586/tosc.v2019.i1.118-141 fatcat:oaycmbqhbjaclbgfatllgq4mym

Boomerang Connectivity Table Revisited. Application to SKINNY and AES

Ling Song, Xianrui Qin, Lei Hu
2019 IACR Transactions on Symmetric Cryptology  
Recently, Cid et al. proposed the Boomerang Connectivity Table (BCT) which unifies the previous switch techniques and incompatibility together and evaluates the probability of Em theoretically when Em  ...  In this paper, we revisit the BCT and propose a generalized framework which is able to identify the actual boundaries of Em which contains dependency of the two differential trails and systematically evaluate  ...  Boomerang Connectivity Table We introduce here the definitions and propositions related to the boomerang connectivity table of S-box S : F n 2 → F n 2 .  ... 
doi:10.13154/tosc.v2019.i1.118-141 dblp:journals/tosc/SongQH19 fatcat:my5o766t5vfl5mmpes35puzpcy

On the boomerang uniformity of (quadratic) permutations over F_2^n [article]

Sihem Mesnager, Chunming Tang, Maosheng Xiong
2019 arXiv   pre-print
that the maximal value in the Boomerang Connectivity Table equals the lowest known differential uniformity).  ...  At Eurocrypt'18, Cid, Huang, Peyrin, Sasaki, and Song introduced a new tool called Boomerang Connectivity Table (BCT) for measuring the resistance of a block cipher against the boomerang attack (which  ...  BCT (optimal means that the maximal value in the Boomerang Connectivity Table equals the lowest known differential uniformity).  ... 
arXiv:1903.00501v1 fatcat:ubxro22o5jhj5eekmoym7pxyli

Boomerang: Real-Time I/O Meets Legacy Systems [article]

Ahmad Golchin, Soham Sinha, Richard West
2020 arXiv   pre-print
We also show how Boomerang outperforms a virtualized system called ACRN, designed for automotive systems.  ...  This paper presents Boomerang, an I/O system that integrates a legacy non-real-time OS with one that is customized for timing-sensitive tasks.  ...  Table IV : IV Latency -20% allowed loss. same applications as Boomerang.  ... 
arXiv:1908.06807v2 fatcat:myfd3uqcqrd57hbjvxviasd4d4

Boomerang: A Metadata-Free Architecture for Control Flow Delivery

Rakesh Kumar, Cheng-Chieh Huang, Boris Grot, Vijay Nagarajan
2017 2017 IEEE International Symposium on High Performance Computer Architecture (HPCA)  
Our second contribution is in Boomerang, a metadata-free architecture for control flow delivery.  ...  We revisit a previously proposed approach of branch-predictor-directed prefetching, which leverages just the branch predictor and BTB to discover and prefetch the missing instruction cache blocks by exploring  ...  1.4 GB SGA DB2 IBM DB2 v8 ESE Database Server 100 warehouses (10GB), 2GB buffer pool Table II WORKLOADS table and an 8K-entry index table for L1-I prefetching.  ... 
doi:10.1109/hpca.2017.53 dblp:conf/hpca/0003HGN17 fatcat:dernqjobsvajbd7hjb7o234rh4

Boomerang Connectivity Table: A New Cryptanalysis Tool [chapter]

Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song
2018 Lecture Notes in Computer Science  
In this paper, we revisit the issue of dependency of two characteristics in Em, and propose a new tool called Boomerang Connectivity Table ( BCT), which evaluates r in a systematic and easy-to-understand  ...  Lastly, we discuss the issue of searching for S-boxes having good BCT and extending the analysis to modular addition. keywords: boomerang attack, S-box, differential distribution table, incompatibility  ...  We call it "Boomerang Connectivity Table (BCT)".  ... 
doi:10.1007/978-3-319-78375-8_22 fatcat:3shnwhxr7jbglipivjqw2iu4ye

Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys

Haoyang Wang, Thomas Peyrin
2019 IACR Transactions on Symmetric Cryptology  
Several research results (ladder switch, S-box switch, sandwich attack, Boomerang Connectivity Table (BCT), ...) showed that the dependency between these two characteristics at the switching round can  ...  In this paper, we revisit the issue of boomerang switching effect, and exploit it in the case where multiple rounds are involved.  ...  Boomerang Switch and Boomerang Connectivity Table.  ... 
doi:10.46586/tosc.v2019.i1.142-169 fatcat:ob2ec3fvendd5k7oxsv7g7zfdu

Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys

Haoyang Wang, Thomas Peyrin
2019 IACR Transactions on Symmetric Cryptology  
Several research results (ladder switch, S-box switch, sandwich attack, Boomerang Connectivity Table (BCT), ...) showed that the dependency between these two characteristics at the switching round can  ...  In this paper, we revisit the issue of boomerang switching effect, and exploit it in the case where multiple rounds are involved.  ...  Boomerang Switch and Boomerang Connectivity Table.  ... 
doi:10.13154/tosc.v2019.i1.142-169 dblp:journals/tosc/WangP19 fatcat:eneb573uwbgnbkekj3aw2i4rse

Transnational Advocacy Networks

Elizabeth A. Bloodgood, Emily Clough
2016 Social science computer review  
4 about here] Two points are apparent from Table 4 .  ...  In the conclusion we revisit the value of agent-based analysis for further study of NGOs and transnational activist networks.  ...  Results are presented in Table 3 .  ... 
doi:10.1177/0894439316634077 fatcat:e2nfttvp5zhilaevyz6dlc7cum

Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL [chapter]

Yu Sasaki
2012 Lecture Notes in Computer Science  
., which proposed the boomerang distinguisher on the encryption mode of MD4, MD5, and HAVAL in the related-key setting.  ...  Firstly, we prove that the differential path for 5-pass HAVAL used in the previous boomerang distinguisher contains a critical flaw and thus the attack cannot work.  ...  Concluding Remarks We studied the boomerang attack approach on hash functions. We proved that the previous differential path on 5-pass HAVAL contained a flaw.  ... 
doi:10.1007/978-3-642-28496-0_1 fatcat:7yi6amv7hffyhbeppuzgcjdwou

Learning to Design in Small Group Mathematical Modeling [chapter]

Terry Wood, Margret A. Hjalmarson, Gaynor Williams
2008 Models and Modeling in Engineering Education  
However, their procedure for the best boomerang  ...  Place Points I Table 10 . 10 3.  ... 
doi:10.1163/9789087904043_011 fatcat:n363ocyguzeovdwgqc7zmwwpla

Boomerang webs up to three-loop order [article]

Einan Gardi, Mark Harley, Rebecca Lodin, Martina Palusa, Jennifer M. Smillie, Chris D. White, Stephanie Yeomans
2021 arXiv   pre-print
Consequently boomerang webs effectively involve only integrals where boomerang gluons straddle one or more gluons that connect to other Wilson lines.  ...  However, boomerang webs differ from other gluon-exchange webs by featuring a lower and non-uniform transcendental weight.  ...  To clarify the above proof, we can revisit the replica analysis of the (2,4) web in table 1.  ... 
arXiv:2110.01685v1 fatcat:3xtxke2mujb3hkqstrrja7plyi

New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect

Boxin Zhao, Xiaoyang Dong, Keting Jia
2019 IACR Transactions on Symmetric Cryptology  
In this paper, we investigate the security of round-reduced Deoxys-BC-256/-384 and Deoxys-I against the related-tweakey boomerang and rectangle attacks with some new boomerang distinguishers.  ...  For Deoxys-BC-256, we present 10-round related-tweakey boomerang and rectangle attacks for the popular setting (|tweak|, |key|) = (128, 128), which reach one more round than the previous attacks in this  ...  Boomerang Switch and Boomerang Connectivity Table.  ... 
doi:10.13154/tosc.v2019.i3.121-151 dblp:journals/tosc/ZhaoDJ19 fatcat:vrfivxmdubehhlx5m5etj6laoa

Differential Cryptanalysis of Round-Reduced Sparx-64/128 [chapter]

Ralph Ankele, Eik List
2018 Lecture Notes in Computer Science  
Second, we illustrate the effectiveness of boomerangs on Sparx by a rectangle attack that requires approximately 2 59.6 chosen ciphertexts and about 2 122.2 encryption equivalents.  ...  Then, we can connect both differentials if we consider V = U ⊕ γ, it follows that V ′ = V ⊕ β = (U ⊕ γ) ⊕ β = (U ⊕ β) ⊕ γ = U ′ ⊕ γ.  ...  It became clear that free-middle boomerangs allowed higher probabilities. Table 6 summarizes the best boomerang that consist of a single characteristic that we could find for one up to five steps.  ... 
doi:10.1007/978-3-319-93387-0_24 fatcat:3z2pluomizf7dnqfvdoosuneaa

Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule

Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu
2021 IACR Transactions on Symmetric Cryptology  
In [SQH19], Song et al. revisited the Boomerang Connectivity Table ( Table 2 : 2 Experiments on the middle part of the boomerang distinguishers for SKINNY.  ...  In 2018, previous observations on the boomerang switch are unified in the framework of boomerang connectivity table (BCT) by Cid et al. [CHP + 18] .  ... 
doi:10.46586/tosc.v2021.i2.249-291 fatcat:43ui6tm7evbftjoylx4o5djksi
« Previous Showing results 1 — 15 out of 794 results