Yoyo tricks with AES

S Rønjom, NG Bardeh, T Helleseth - … on the Theory and Applications of …, 2017 - Springer
… -independent yoyo-distinguishers for 3- to 5-rounds of AES. All of … for 6-rounds AES based
on yoyos that preserve impossible … -recovery attack on 5-rounds of AES that requires only \(2^{…

New Yoyo tricks with AES-based permutations

D Saha, M Rahman, G Paul - IACR Transactions on Symmetric …, 2018 - tosc.iacr.org
… of Yoyo which enables us to start the Yoyo game from an internal round. As an application,
we investigate the AESbased … We manage to augment Yoyo with improbable and impossible …

Revisiting Yoyo Tricks on AES

SK Mondal, M Rahman, S Sarkar… - IACR Transactions on …, 2023 - tosc.iacr.org
… give some preliminary ideas about yoyo attacks. In addition to that, a brief description of AES
is also provided in this section. In Section 3 we revisit the yoyo attack on AES and provide a …

Boomeyong: Embedding yoyo within boomerang and its applications to key recovery attacks on AES and pholkos

M Rahman, D Saha, G Paul - Cryptology ePrint Archive, 2022 - eprint.iacr.org
… added to the ciphertexts leads to a yoyo word-swap in the boundary of … yoyo and leads to
return of the yoyo with probability 1 which can be verified at the top, like the classical yoyo trick. …

Yoyo cryptanalysis on Future

SK Mondal, M Rahman, S Sarkar… - … Journal of Applied …, 2024 - inderscienceonline.com
… In FSE 2018, Saha et al. distinguished AES in a known key setting up to 8 rounds. In … design
is like AES with some tweaks. In this paper, we analysed Future by Yoyo trick in both secret …

Remarks on Mixture and Yoyo Distinguishers for Reduced-Round AES

C Duan, L Tan, W Qi - 2020 5th International Conference on …, 2020 - ieeexplore.ieee.org
… In this section we recall the yoyo distinguishers on 4-round and 6-round AES. Since the AK
operation does not influence differences, it can be omitted. Commuting SR operation with SB …

Cryptanalysis of Symmetric Key Schemes using Classical and Quantum Techniques

M Rahman - 2022 - library.isical.ac.in
… -out application of yoyo which enables us to start the yoyo game from an … yoyo which enables
us to start the yoyo game from an internal round. As an application, we investigate the AES-…

The Retracing Boomerang Attack, with Application to Reduced-Round AES

O Dunkelman, N Keller, E Ronen, A Shamir - Journal of Cryptology, 2024 - Springer
… Apart of allowing us to obtain better results in cryptanalysis of specific AES variants, our new
… and the yoyo tricks with AES, introduced recently by Rønjom et al. [46]. While ‘yoyo tricks’ …

Yoyo trick on type‐II generalised Feistel networks

T Hou, T Cui - IET Information Security, 2021 - Wiley Online Library
… can be seen as a generalised yoyo game with the lowest computational complexity for both
usual AES and the secret-S-box AES [24]. Because the yoyo game attack performs quite well …

The retracing boomerang attack

O Dunkelman, N Keller, E Ronen, A Shamir - … International Conference on …, 2020 - Springer
… The main AES variant we consider in this paper is the 5-round version of … attack and the
yoyo tricks with AES, introduced recently by Rønjom et al. [30]. While the ‘yoyo tricks’ differ …