Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128

8Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper we show that the full-round Eagle-64 and Eagle-128 are vulnerable to the related-key amplified boomerang attack. The attack on the full-round Eagle-64 requires 265 full-round Eagle-64 decryptions with 237 related-key chosen ciphertexts, while the attack on the full-round Eagle-128 requires about 2154.51 full-round Eagle-128 encryptions with 294.83 related-key chosen plaintexts. These works are the first known attacks on Eagle-64 and Eagle-128. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Jeong, K., Lee, C., Sung, J., Hong, S., & Lim, J. (2007). Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4586 LNCS, pp. 143–157). Springer Verlag. https://doi.org/10.1007/978-3-540-73458-1_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free