Feb. 27, 2024, 11 a.m. |

IACR News www.iacr.org

ePrint Report: Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond

Ling Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng


In differential-like attacks, the process typically involves extending a distinguisher forward and backward with probability 1 for some rounds and recovering the key involved in the extended part. Particularly in rectangle attacks, a holistic key recovery strategy can be employed to yield the most efficient attacks tailored to a given distinguisher. In this paper, we treat the …

attacks beyond chen eprint report extensions forward framework key process report song the key

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)