This article includes a list of general references, but it lacks sufficient corresponding inline citations. Please help to improve this article by introducing more precise citations.(March 2009) (Learn how and when to remove this message)
In cryptography, the boomerang attack is a method for the cryptanalysis of block ciphers based on differential cryptanalysis. The attack was published in 1999 by David Wagner, who used it to break the COCONUT98 cipher.
The boomerang attack has allowed new avenues of attack for many ciphers previously deemed safe from differential cryptanalysis.
Refinements on the boomerang attack have been published: the amplified boomerang attack, and the rectangle attack.
Due to the similarity of a Merkle–Damgård construction with a block cipher, this attack may also be applicable to certain hash functions such as MD5.[1]
^Joux, Antoine; Peyrin, Thomas (2007). "Hash Functions and the (Amplified) Boomerang Attack". In Menezes, Alfred (ed.). Advances in Cryptology - CRYPTO 2007. Lecture Notes in Computer Science. Vol. 4622. Berlin, Heidelberg: Springer. pp. 244–263. doi:10.1007/978-3-540-74143-5_14. ISBN 978-3-540-74143-5.
cryptography, the boomerangattack is a method for the cryptanalysis of block ciphers based on differential cryptanalysis. The attack was published in...
COCONUT98's security, in 1999 David Wagner developed the boomerangattack against it. This attack, however, requires both chosen plaintexts and adaptive...
Captain Boomerang is the name of two supervillains appearing in American comic books published by DC Comics, who respectively serve as enemies to both...
The CAC Boomerang is a fighter aircraft designed and manufactured in Australia by the Commonwealth Aircraft Corporation between 1942 and 1945. Approved...
square and integral attacks, slide attacks, boomerangattacks, the XSL attack, impossible differential cryptanalysis, and algebraic attacks. For a new block...
complexity are required merely to distinguish the cipher from random. A boomerangattack (Wagner, 1999) can be used in an adaptive chosen plaintext / chosen...
scenarios; it presents a 224 time complexity attack to recover the S-box in a chosen-key scenario, a 248 boomerangattack to recover the key with a known S-box...
round 3 of the NIST hash function competition. In 2009, a related key boomerangattack against a reduced round Threefish version was published. For the 32-round...
transforms into Sailor Mars. After Usagi launches one final Moon Tiara Boomerangattack to trap Jadeite, Rei overpowers Jadeite's ice abilities with her own...
separate into swords and shields to be used in their Combination Cross Boomerangattack. Rolling Vulcan (ローリングバルカン, Rōringu Barukan): The finishing cannon...
a related-key rectangle (boomerang) attack on KASUMI that can break all 8 rounds faster than exhaustive search. The attack requires 254.6 chosen plaintexts...
co-discoverer of the slide and boomerangattacks. Xiaoyun Wang, the People's Republic of China, known for MD5 and SHA-1 hash function attacks. Alex Biryukov, University...
In cryptography, a timing attack is a side-channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute...
Operation Boomerang was a partially successful air raid by the United States Army Air Forces' (USAAF) XX Bomber Command against oil refining facilities...
Koenigsegg. There are two variations of the car – "Absolut" (top speed) and "Attack" (track-focused). The engine is a development of the 5.1 L (5,065 cc) twin-turbocharged...
Shadow of the Boomerang is a 1960 Australian drama film directed by Dick Ross and written by Dick Ross and John Ford. It is a 'Christian Western' about...