Login / Signup

Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT.

Hosein HadipourPatrick DerbezMaria Eichlseder
Published in: CRYPTO (4) (2024)
Keyphrases
  • block cipher
  • encryption algorithm
  • b spline
  • feature space
  • s box
  • cryptographic algorithms