Yoyo tricks with AES
S Rønjom, NG Bardeh, T Helleseth - … on the Theory and Applications of …, 2017 - Springer
… -independent yoyo-distinguishers for 3- to 5-rounds of AES. All of … for 6-rounds AES based
on yoyos that preserve impossible … -recovery attack on 5-rounds of AES that requires only \(2^{…
on yoyos that preserve impossible … -recovery attack on 5-rounds of AES that requires only \(2^{…
New Yoyo tricks with AES-based permutations
… of Yoyo which enables us to start the Yoyo game from an internal round. As an application,
we investigate the AESbased … We manage to augment Yoyo with improbable and impossible …
we investigate the AESbased … We manage to augment Yoyo with improbable and impossible …
Revisiting Yoyo Tricks on AES
… give some preliminary ideas about yoyo attacks. In addition to that, a brief description of AES
is also provided in this section. In Section 3 we revisit the yoyo attack on AES and provide a …
is also provided in this section. In Section 3 we revisit the yoyo attack on AES and provide a …
Boomeyong: Embedding yoyo within boomerang and its applications to key recovery attacks on AES and pholkos
… added to the ciphertexts leads to a yoyo word-swap in the boundary of … yoyo and leads to
return of the yoyo with probability 1 which can be verified at the top, like the classical yoyo trick. …
return of the yoyo with probability 1 which can be verified at the top, like the classical yoyo trick. …
Yoyo cryptanalysis on Future
… In FSE 2018, Saha et al. distinguished AES in a known key setting up to 8 rounds. In … design
is like AES with some tweaks. In this paper, we analysed Future by Yoyo trick in both secret …
is like AES with some tweaks. In this paper, we analysed Future by Yoyo trick in both secret …
Remarks on Mixture and Yoyo Distinguishers for Reduced-Round AES
C Duan, L Tan, W Qi - 2020 5th International Conference on …, 2020 - ieeexplore.ieee.org
… In this section we recall the yoyo distinguishers on 4-round and 6-round AES. Since the AK
operation does not influence differences, it can be omitted. Commuting SR operation with SB …
operation does not influence differences, it can be omitted. Commuting SR operation with SB …
Cryptanalysis of Symmetric Key Schemes using Classical and Quantum Techniques
M Rahman - 2022 - library.isical.ac.in
… -out application of yoyo which enables us to start the yoyo game from an … yoyo which enables
us to start the yoyo game from an internal round. As an application, we investigate the AES-…
us to start the yoyo game from an internal round. As an application, we investigate the AES-…
The Retracing Boomerang Attack, with Application to Reduced-Round AES
… Apart of allowing us to obtain better results in cryptanalysis of specific AES variants, our new
… and the yoyo tricks with AES, introduced recently by Rønjom et al. [46]. While ‘yoyo tricks’ …
… and the yoyo tricks with AES, introduced recently by Rønjom et al. [46]. While ‘yoyo tricks’ …
Yoyo trick on type‐II generalised Feistel networks
T Hou, T Cui - IET Information Security, 2021 - Wiley Online Library
… can be seen as a generalised yoyo game with the lowest computational complexity for both
usual AES and the secret-S-box AES [24]. Because the yoyo game attack performs quite well …
usual AES and the secret-S-box AES [24]. Because the yoyo game attack performs quite well …
The retracing boomerang attack
… The main AES variant we consider in this paper is the 5-round version of … attack and the
yoyo tricks with AES, introduced recently by Rønjom et al. [30]. While the ‘yoyo tricks’ differ …
yoyo tricks with AES, introduced recently by Rønjom et al. [30]. While the ‘yoyo tricks’ differ …