@inproceedings{409fceecc6474511a91aeb921780d045,
title = "Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128",
abstract = "In this paper we show that the full-round Eagle-64 and Eagle-128 are vulnerable to the related-key amplified boomerang attack. The attack on the full-round Eagle-64 requires 265 full-round Eagle-64 decryptions with 237 related-key chosen ciphertexts, while the attack on the full-round Eagle-128 requires about 2154.51 full-round Eagle-128 encryptions with 294.83 related-key chosen plaintexts. These works are the first known attacks on Eagle-64 and Eagle-128.",
keywords = "Block Ciphers, Data-dependent operations, Eagle-128, Eagle-64, Related-key amplified Boomerang attack",
author = "Kitae Jeong and Changhoon Lee and Jaechul Sung and Seokhie Hong and Jongin Lim",
year = "2007",
doi = "10.1007/978-3-540-73458-1_12",
language = "English",
isbn = "3540734570",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "143--157",
booktitle = "Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings",
address = "Germany",
note = "12th Australasian Conference on Information Security and Privacy, ACISP2007 ; Conference date: 02-07-2007 Through 04-07-2007",
}