The Design of Rijndael
Improved Impossible Differential Cryptanalysis of Rijndael and Crypton
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Improved Cryptanalysis of Rijndael
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Battery power-aware encryption
ACM Transactions on Information and System Security (TISSEC)
A Meet-in-the-Middle Attack on 8-Round AES
Fast Software Encryption
Improved Impossible Differential Attacks on Large-Block Rijndael
ISC '08 Proceedings of the 11th international conference on Information Security
New Related-Key Boomerang Attacks on AES
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
A Cryptanalytic View of the NSA's Skipjack Block Cipher Design
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Attacking 9 and 10 Rounds of AES-256
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Improved Meet-in-the-Middle Attacks on AES
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
A linear analysis of Blowfish and Khufu
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
New results on impossible differential cryptanalysis of reduced AES
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
The (related-key) impossible boomerang attack and its application to the AES block cipher
Designs, Codes and Cryptography
Related-Key impossible differential attacks on 8-round AES-192
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Related-Key boomerang and rectangle attacks
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware
Fundamenta Informaticae - Cryptology in Progress: 10th Central European Conference on Cryptology, Będlewo Poland, 2010
Related-key rectangle attacks on reduced AES-192 and AES-256
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Impossible-differential attacks on large-block Rijndael
ISC'07 Proceedings of the 10th international conference on Information Security
Improved impossible differential attacks on large-block rijndael
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Hi-index | 0.00 |
In this note we study security of 128-bit key 10-round AES against the boomerang attack. We show attacks on AES reduced to 5 and 6 rounds, much faster than the exhaustive key search and twice faster than the “Square” attack of the AES designers. The attacks are structural and apply to other SPN ciphers with incomplete diffusion.