{"id":"https://openalex.org/W3199406320","doi":"https://doi.org/10.46586/tosc.v2021.i3.137-169","title":"Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos","display_name":"Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos","publication_year":2021,"publication_date":"2021-09-17","ids":{"openalex":"https://openalex.org/W3199406320","doi":"https://doi.org/10.46586/tosc.v2021.i3.137-169","mag":"3199406320"},"language":"en","primary_location":{"id":"doi:10.46586/tosc.v2021.i3.137-169","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2021.i3.137-169","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/9177/8715","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tosc.iacr.org/index.php/ToSC/article/download/9177/8715","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054077729","display_name":"Mostafizar Rahman","orcid":"https://orcid.org/0000-0003-0934-4769"},"institutions":[{"id":"https://openalex.org/I6498739","display_name":"Indian Statistical Institute","ror":"https://ror.org/00q2w1j53","country_code":"IN","type":"education","lineage":["https://openalex.org/I6498739"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Mostafizar Rahman","raw_affiliation_strings":["Cryptology and Security Research Unit (CSRU), Indian Statistical Institute, Kolkata, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Cryptology and Security Research Unit (CSRU), Indian Statistical Institute, Kolkata, India","institution_ids":["https://openalex.org/I6498739"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068524908","display_name":"Dhiman Saha","orcid":"https://orcid.org/0000-0001-5162-9683"},"institutions":[{"id":"https://openalex.org/I4210121466","display_name":"Indian Institute of Technology Bhilai","ror":"https://ror.org/02sscsx71","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210121466"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dhiman Saha","raw_affiliation_strings":["de.ci.phe.red Lab, Department of Electrical Engineering and Computer Science, Indian Institute of Technology, Bhilai, Raipur, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"de.ci.phe.red Lab, Department of Electrical Engineering and Computer Science, Indian Institute of Technology, Bhilai, Raipur, India","institution_ids":["https://openalex.org/I4210121466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026354959","display_name":"Goutam Paul","orcid":"https://orcid.org/0000-0002-5160-6032"},"institutions":[{"id":"https://openalex.org/I6498739","display_name":"Indian Statistical Institute","ror":"https://ror.org/00q2w1j53","country_code":"IN","type":"education","lineage":["https://openalex.org/I6498739"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Goutam Paul","raw_affiliation_strings":["Cryptology and Security Research Unit (CSRU), Indian Statistical Institute, Kolkata, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Cryptology and Security Research Unit (CSRU), Indian Statistical Institute, Kolkata, India","institution_ids":["https://openalex.org/I6498739"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5054077729"],"corresponding_institution_ids":["https://openalex.org/I6498739"],"apc_list":null,"apc_paid":null,"fwci":2.5187,"has_fulltext":true,"cited_by_count":21,"citation_normalized_percentile":{"value":0.91181446,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"137","last_page":"169"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.8178207278251648},{"id":"https://openalex.org/keywords/boomerang-attack","display_name":"Boomerang attack","score":0.7463408708572388},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7003344893455505},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6437182426452637},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5541771054267883},{"id":"https://openalex.org/keywords/merge","display_name":"Merge (version control)","score":0.5500437617301941},{"id":"https://openalex.org/keywords/watermarking-attack","display_name":"Watermarking attack","score":0.5292189717292786},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49889516830444336},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3449753224849701},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32120296359062195},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.29191553592681885},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.21539363265037537},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.10703441500663757},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.046492189168930054}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.8178207278251648},{"id":"https://openalex.org/C147552392","wikidata":"https://www.wikidata.org/wiki/Q2869899","display_name":"Boomerang attack","level":5,"score":0.7463408708572388},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7003344893455505},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6437182426452637},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5541771054267883},{"id":"https://openalex.org/C197129107","wikidata":"https://www.wikidata.org/wiki/Q1921621","display_name":"Merge (version control)","level":2,"score":0.5500437617301941},{"id":"https://openalex.org/C122760801","wikidata":"https://www.wikidata.org/wiki/Q2552011","display_name":"Watermarking attack","level":5,"score":0.5292189717292786},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49889516830444336},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3449753224849701},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32120296359062195},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.29191553592681885},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.21539363265037537},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.10703441500663757},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.046492189168930054},{"id":"https://openalex.org/C69254412","wikidata":"https://www.wikidata.org/wiki/Q6554302","display_name":"Link encryption","level":4,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.46586/tosc.v2021.i3.137-169","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2021.i3.137-169","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/9177/8715","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ad07eb71c9ad49f7be8044a024122732","is_oa":true,"landing_page_url":"https://doaj.org/article/ad07eb71c9ad49f7be8044a024122732","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Vol 2021, Iss 3 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tosc.v2021.i3.137-169","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2021.i3.137-169","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/9177/8715","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3199406320.pdf","grobid_xml":"https://content.openalex.org/works/W3199406320.grobid-xml"},"referenced_works_count":58,"referenced_works":["https://openalex.org/W56012719","https://openalex.org/W351251939","https://openalex.org/W577451423","https://openalex.org/W1493204363","https://openalex.org/W1498330251","https://openalex.org/W1501856114","https://openalex.org/W1518406241","https://openalex.org/W1525447969","https://openalex.org/W1530646519","https://openalex.org/W1540066842","https://openalex.org/W1541703086","https://openalex.org/W1545756401","https://openalex.org/W1546987793","https://openalex.org/W1554865288","https://openalex.org/W1556212265","https://openalex.org/W1563341929","https://openalex.org/W1575164904","https://openalex.org/W1580638739","https://openalex.org/W1584463697","https://openalex.org/W1585657170","https://openalex.org/W1587120902","https://openalex.org/W1597699498","https://openalex.org/W1598147411","https://openalex.org/W1629301835","https://openalex.org/W1754198554","https://openalex.org/W1794421227","https://openalex.org/W1870015754","https://openalex.org/W1886859749","https://openalex.org/W1965570021","https://openalex.org/W1965810977","https://openalex.org/W2067040124","https://openalex.org/W2103526652","https://openalex.org/W2130073314","https://openalex.org/W2145038746","https://openalex.org/W2157803851","https://openalex.org/W2338151569","https://openalex.org/W2395664524","https://openalex.org/W2407639567","https://openalex.org/W2575957737","https://openalex.org/W2795355075","https://openalex.org/W2883079933","https://openalex.org/W2912948087","https://openalex.org/W2940854150","https://openalex.org/W2951769301","https://openalex.org/W2982416332","https://openalex.org/W3013472163","https://openalex.org/W3096548238","https://openalex.org/W4225883647","https://openalex.org/W4236635680","https://openalex.org/W4241072010","https://openalex.org/W4243092246","https://openalex.org/W4245977870","https://openalex.org/W4247782760","https://openalex.org/W4249020637","https://openalex.org/W4250739989","https://openalex.org/W4253793143","https://openalex.org/W4388802022","https://openalex.org/W6631655849"],"related_works":["https://openalex.org/W3137012527","https://openalex.org/W3031240141","https://openalex.org/W1568781938","https://openalex.org/W1508220342","https://openalex.org/W3021510930","https://openalex.org/W2617200824","https://openalex.org/W2791274315","https://openalex.org/W172003530","https://openalex.org/W2407138520","https://openalex.org/W3199406320"],"abstract_inverted_index":{"This":[0],"work":[1],"investigates":[2],"a":[3,55,59,66,120,131],"generic":[4],"way":[5],"of":[6,78,100,124,149,177],"combining":[7],"two":[8],"very":[9],"effective":[10],"and":[11,30,47,116,161,168],"well-studied":[12],"cryptanalytic":[13],"tools,":[14],"proposed":[15,135],"almost":[16],"18":[17],"years":[18],"apart,":[19],"namely":[20],"the":[21,31,44,98,101,134,138,147,154,159,175],"boomerang":[22,60,140,162],"attack":[23,33,70,84,141],"introduced":[24,87],"by":[25,34,114],"Wagner":[26],"in":[27,38,143],"FSE":[28],"1999":[29],"yoyo":[32,56,160],"Ronjom":[35],"et":[36],"al.":[37],"Asiacrypt":[39],"2017.":[40],"In":[41],"doing":[42],"so,":[43],"s-box":[45],"switch":[46,49],"ladder":[48],"techniques":[50,163],"are":[51,111],"leveraged":[52],"to":[53,96,157,164],"embed":[54],"trail":[57],"inside":[58],"trail.":[61],"As":[62],"an":[63,179],"immediate":[64],"application,":[65],"6-round":[67],"key":[68,82],"recovery":[69,83],"on":[71,85,104,109,119],"AES-128":[72],"is":[73,93,153],"mounted":[74],"with":[75,137],"time":[76],"complexity":[77],"278.":[79],"A":[80],"10-round":[81],"recently":[86],"AES-based":[88],"tweakable":[89],"block":[90],"cipher":[91],"Pholkos":[92],"also":[94],"furnished":[95],"demonstrate":[97],"applicability":[99],"new":[102],"technique":[103],"AES-like":[105],"constructions.":[106],"The":[107],"results":[108],"AES":[110],"experimentally":[112],"verified":[113],"applying":[115],"implementing":[117],"them":[118],"small":[121],"scale":[122],"variant":[123],"AES.":[125],"We":[126],"provide":[127],"arguments":[128],"that":[129],"draw":[130],"relation":[132],"between":[133],"strategy":[136],"retracing":[139],"devised":[142],"Eurocrypt":[144],"2020.":[145],"To":[146],"best":[148],"our":[150],"knowledge,":[151],"this":[152],"first":[155],"attempt":[156],"merge":[158],"analyze":[165],"SPN":[166],"ciphers":[167],"warrants":[169],"further":[170],"attention":[171],"as":[172],"it":[173],"has":[174],"potential":[176],"becoming":[178],"important":[180],"cryptanalysis":[181],"tool.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":6}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
